D334 EXAM (ACTUAL EXAM) WITH
CORRECT ACTUAL QUESTIONS AND
CORRECTLY WELL DEFINED ANSWERS
LATEST ALREADY GRADED A+ 2026
_____ is a light-weight symmetric block cipher with variable
block sizes, key sizes, and rounds, that is optimized
forsoftware implementations. - ANSWERS-SPECK
PRESENT is a symmetric block cipher that was one of the
first to be considered as a(n) _____ replacement for light-
weight implementations. - ANSWERS-AES
Rabbit operates with a key size of ______ bits and an
initialization vector (IV) of _____ bits. - ANSWERS-128 bit
keys; 64 bit IV
,______ is a secret key encryption algorithm, designed by the
NSA, and was used with the Clipper chip. - ANSWERS-
Skipjack
The IV used with WEP is ____ bits. - ANSWERS-24
The IV used with WPA is _____ bits. - ANSWERS-48
Two variation of WPA are ____ and ____. - ANSWERS-PSK;
enterprise
A5/3 is for _____ , and is based on the MISTY1 cipher. -
ANSWERS-3GPP
A5/1 is designed to be used for the _____ network. -
ANSWERS-GSM
Google proposed _____ as an alternative to AES to be used
with TLS connections. - ANSWERS-ChaCha20
_____ is a light-weight public key solution that uses Elliptic
Curves along with a Diffie-Hellman related handshake
,between the RFID tag and the RFID reader in RFID
implementations. - ANSWERS-Elli
Buzhash, Cityhash, Spookyhash, and Bernstein are examples
of _______ hash solutions. - ANSWERS-non-cryptographic
_____ allow for a new unique passcode to be created for
each instance based on an initial seed. - ANSWERS-One
Time Passwords (OTP)
Frequency Analysis - ANSWERS-is cipher cracking
methodology that involves identifying patterns and
variations in the probability of codes. i.e. a three-letter
ciphered text combination spotted at the beginning of a
string too often could tip us off that those three letters
correlate the letters THE in the English alphabet.
True Random Number Generators (TRNGs) - ANSWERS-This
method generates a true random number and uses some
form of random process. One approach is to monitor the
movements of a mouse pointer on a screen or from the
pauses between keystrokes. Overall, the method is
generally slow, especially if it involves human interaction,
but is non-deterministic and aperiodic.
, Entropy - ANSWERS-measures level of unpredictability; in
encryption relates to the degree of uncertainty of the
encryption process.
ASCII - ANSWERS-8-bit values, up to 256 characters
UTF-16 - ANSWERS-16- bit values, up to 65,536 characters
Hardware vs Software encryption - ANSWERS-Hardware
encryption is more efficient than software encryption.
Hardware Security Module (HSM) - ANSWERS-is a tamper-
evident and intrusion-resistant physical device that
safeguards and manages cryptographic keys and provides
cryptographic processing.
Trusted Platform Module (TPM) - ANSWERS-is a dedicated
processor that handles hardware-level encryption; allows
the use of full disk encryption on a hard drive in a manner
that minimizes the impact on system performance. TPM
contains the encryption keys.