WITH QUESTIONS AND WELL VERIFIED
ANSWERS [GRADED A+} REAL EXAM !!!! REAL
EXAM !!!
A crypto miner is competing with other miners to mine a new token that will
be added to the cryptocurrency blockchain. Which technique can the miner
use to mine the block?
A Chain linking
B Record of transaction
C Smart contracts
D Proof of work - ANSWER✔✔-Proof of work
How do you measure the amount of computational effort required to
perform a transaction or execute a contract on the Ethereum blockchain?
A Proof of work
B Hyperledger
C Record of transaction
D Gas - ANSWER✔✔-Gas
A wireless client wants to gain access to a network. Which wireless security
standards can the network device use to authenticate the client?
A WPA-2
B WEP
C WPA
,D LEAP - ANSWER✔✔-LEAP
A social media company refuses to hand over the encryption keys involved
in secure communications to the government for an ongoing investigation.
Which cryptographic backdoor will allow only the government agents to
crack the encryption, but no one else?
A RSA cracking
B Encryption by default
C Key escrow
D NOBUS backdoor - ANSWER✔✔-NOBUS backdoor
Which cryptanalysis attacks involve examining patterns in the random
characters combined with the plaintext message to produce the ciphertext
to see how long the key goes before it starts to repeat?
A Linear cryptanalysis
B Frequency analysis
C Algebraic attacks
D Keystream analysis - ANSWER✔✔-Keystream analysis
An intruder is trying to break a cryptographic code by attacking both the
plaintext and the ciphertext at the same time. Which type of attack is the
intruder using?
A Frequency analysis
B Linear cryptanalysis
C Differential cryptanalysis
D Double DES attack - ANSWER✔✔-Double DES attack
, Which IT security standard provides internationally-recognized criteria for
validating and approving encryption devices for deployment?
A FIPS 199
B SP 800-53
C FISMA
D FIPS 140-2 - ANSWER✔✔-FIPS 140-2
A company wants to protect the content of employees' laptops to make
sure that, in case of a loss, someone who finds the laptop cannot easily
bypass the operating system access controls by placing the hard drive in
another computer system. Which encryption method can the company use
for this scenario?
A Self-encrypting drive
B File encryption
C Trusted Platform Module
D Full disk encryption - ANSWER✔✔-Full disk encryption
A bank's customer wants to log in to a bank's website at
https://www.bankname.com to do an online banking transaction. How can
this customer make sure the bank is authentic and someone else is not
pretending to be the bank?
A Choosing a symmetric session key
B Sending a Client Hello
C Receiving a Server Hello
D Verifying that the public key belongs to the bank through the bank's
digital - ANSWER✔✔-Verifying that the public key belongs to the bank
through the bank's digital
A bank's customer opens the log-in page of the bank to do an online
banking transaction. How can the customer verify that the bank's digital