UPDATED ACTUAL Exam Questions and
CORRECT Answers
What term below best describes an attack in which the attacker obtains ciphertext corresponding
to a set of plaintexts to use in an attempt to derive the key used? - CORRECT ANSWER -
Chosen plaintext
Which attack is like a chosen-plaintext attack, except the attacker can obtain ciphertexts
encrypted under two different keys? - CORRECT ANSWER - Related-key Attack
What is a known plaintext attack and uses a linear approximation to describe the behavior of the
block cipher and was invented by Mitsarue Matsui ? - CORRECT ANSWER - Linear
Cryptanalysis
From the list below, what term describes a mechanism used to create number streams with
random properties? Examples include Lagged Fibonacci and Mersenne Twister. - CORRECT
ANSWER - Pseudo-random number generator (PRNG)
What term from the list below best describes a number whose factors are 1 and itself? -
CORRECT ANSWER - Prime
Which term from the list below represents the total number of possible values of keys in a
cryptographic algorithm or other security measure? - CORRECT ANSWER - Key space
Which term from the list below represents the entire cryptographic operation i.e. the algorithm,
key, and key management functions? - CORRECT ANSWER - Cryptosystem
Which cipher makes use of a 5x5 table containing a keyword or key phrase and encrypts pairs of
letters or digraphs? - CORRECT ANSWER - Playfair
, Which cipher entails using a rod of a certain length to create/encrypt a message, and the
requiring the message recipient to use an identical sized rod to read/decrypt the message? -
CORRECT ANSWER - Scytale
What type of cryptanalysis involves the examination of differences in an input and how that
affects the resultant difference in output? - CORRECT ANSWER - Differential cryptanalysis
Which WiFi encryption standard is based on 802.11i and uses AES with CCMP to provide for
enhanced confidentiality, integrity and authentication? - CORRECT ANSWER - WPA-2
What are the two types of symmetric encryption? - CORRECT ANSWER - Block and Stream
Which of the following is true of hash encryption? - CORRECT ANSWER - Accepts a
variable length input and produces a fixed length output
Which of the following is NOT required for a hash? - CORRECT ANSWER - Minimum key
length
Which of the following are required for a hash? - CORRECT ANSWER - input can be any
length and output has a fixed length, is one-way and collision-free
Which software-based stream cipher uses a lagged Fibonacci generator? - CORRECT
ANSWER - FISH
The Advanced Encryption Standard is a subset of which algorithm? - CORRECT ANSWER -
Rijndael
From the list below, which term is best described as random bits added to a password hash to
help with safeguarding passwords in storage? - CORRECT ANSWER - Salt