Module 4
PRACTICE EXAM QUESTIONS WITH
CORRECT DETAILED ANSWERS |
ALREADY GRADED A+<RECENT
vERSION>
1) Symmetric - ANSWER Which encryption standard uses the same key to
encrypt and decrypt messages?
2) Skipjack - ANSWER Which algorithm is designated as a Type 2 product by
the National Security Agency (NSA)?
3) X.509 v3 - ANSWER What is the most commonly used format for
certificates?
4) Certificate revocation list (CRL) - ANSWER What is referenced to determine
if a certificate has been revoked?
5) Sender's public key - ANSWER What needs to be installed on end users'
computers to allow them to trust applications that have been digitally signed by
the developer?
6) Public Certificate - ANSWER Which type of certificate must be certified by
an authority to verify it with other participants?
7) It requires a unique nonce. - ANSWER What is an attribute of the Rivest
Cipher 4 (RC4) algorithm?
,8) Counter (CTR) - ANSWER Which mode generates the key stream with a
nonce and incrementing value?
9) Counter (CTR) - ANSWER Which mode is a stream algorithm that
concatenates an incrementing value with a nonce?
10) CEO's public key - ANSWER Which key would an administrator use to
encrypt data so only the CEO can decrypt it?
11) Digest - ANSWER What is the result of a hash function?
12) Symmetric encryption - ANSWER What is used to efficiently encrypt large
files?
13) hvxfirgb - ANSWER An administrator needs to encrypt the following word
with the Atbash cipher: security What is the correct ciphertext?
14) Message Digest Algorithm 5 (MD5) - ANSWER Which cryptographic
algorithm has a 128-bit hash size?
15) Collision resistance - ANSWER Which characteristic makes a hashing
function suitable for use in signature schemes?
16) Partial-message collision - ANSWER Which attribute of a hashing function
makes a birthday attack possible?
17) SHA-1 - ANSWER Which hash algorithm produces a 160-bit output value?
18) Previous generated ciphertext - ANSWER What does cipher block chaining
(CBC) use with the key to encrypt subsequent blocks of plaintext?
,19) Electronic codebook (ECB) - ANSWER Which mode produces the same
ciphertext from two identical plaintext blocks?
20) Electronic codebook (ECB) - ANSWER Which encryption mode is least
secure?
21) P = E (K,C) - ANSWER What is the mathematical formula used for
symmetric decryption?
22) Rivest-Shamir-Adleman - ANSWER Which algorithm relies on factoring the
product of large prime numbers?
23) Pretty Good Privacy (PGP) - ANSWER Which encryption technology is a
serial combination of hashing, data compression, symmetric-key cryptography,
and public key infrastructure (PKI) and can be used for encrypting texts, emails,
files, and directories or for full disk encryption?
24) Kerckhoffs's principle - ANSWER Which concept stipulates that algorithms
should be openly shared and scrutinized, but keys must be absolutely secured?
25) Randomizing the initialization vector - ANSWER Which encryption process
minimizes known plaintext attacks against Advanced Encryption Standard
(AES)?
26) Salting - ANSWER What prevents a rainbow table attack during the
encryption process?
27) Larger key size - ANSWER Which factor increases the required number of
attempts in a brute-force attack?
28) Key length is too short. - ANSWER What is a vulnerability of the Data
Encryption Standard (DES)?
, 29) 128 - ANSWER Which block size does the Advanced Encryption Standard
(AES) use?
30) Skipjack - ANSWER Which block algorithm includes a provision for the
decryption key kept in a key escrow?
31) A|C - ANSWER What is the result of A|B and B|C?
32) ( X mod P, X mod Q) - ANSWER How is X mod N if N = PQ represented in
number theory?
33) 10000 - ANSWER What is the outcome when using the binary AND function
on 11011 and 10100?
34) Counter (CTR) - ANSWER Which mode does the Fortuna algorithm use to
generate random numbers?
35) Salt - ANSWER In relationship to hashing, the term _____refers to random
bits that are used as one of the inputs to the hash. Essentially the is intermixed
with the message that is to be hashed
36) MD5 - ANSWER This is a 128 bit hash that is specified by RFC 1321. It was
designed by Ron Rivest in 1991 to replace an earlier hash function.
37) FORK256 - ANSWER This hash function uses 512-bit blocks and implements
preset constants that change after each repetition. Each block is hashed into a
256-bit block through four branches that divides each 512 block into sixteen 32-
bit words that are further encrypted and rearranged
38) RSA - ANSWER Which of the following is an asymmetric algorithm that was
first publicaly described in 1977?