100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

C839v5/D334 Additional Practice UPDATED ACTUAL Exam Questions and CORRECT Answers

Rating
-
Sold
-
Pages
35
Grade
A+
Uploaded on
20-04-2025
Written in
2024/2025

C839v5/D334 Additional Practice UPDATED ACTUAL Exam Questions and CORRECT Answers 128 - CORRECT ANSWER A. 128 B. 160 C. 256 - The hash value in bits for MD5 is ____. variable; fixed - CORRECT ANSWER - Hashing involves taking a _____ length input and producing a _____ length output (message digest). A. fixed; fixed B. variable; fixed C. fixed; variabl

Show more Read less
Institution
D334
Course
D334











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
D334
Course
D334

Document information

Uploaded on
April 20, 2025
Number of pages
35
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

C839v5/D334 Additional Practice UPDATED
ACTUAL Exam Questions and CORRECT
Answers
128 - CORRECT ANSWER - The hash value in bits for MD5 is ____.
A. 128
B. 160
C. 256


variable; fixed - CORRECT ANSWER - Hashing involves taking a _____ length input and
producing a _____ length output (message digest).
A. fixed; fixed
B. variable; fixed
C. fixed; variable


160 - CORRECT ANSWER - The hash value in bits for SHA-1 is ____.
A. 128
B. 160
C. 256


128 - CORRECT ANSWER - The hash value in bits for MD4 is ____.
A. 128
B. 160
C. 256


Transport - CORRECT ANSWER - IPSec ______ mode involves "end-to-end" encryption;
i.e. data remains encrypted from the time it leaves a sender's device to the time it arrives at the
receiver's device.

,A. Tunnel
B. Transport
C. Trusted


Tunnel - CORRECT ANSWER - IPSec ______ mode involves encryption from gateway to
gateway, i.e. just through the public network space.
A. Tunnel
B. Transport
C. Trusted


Tunnel


Remember, with tunnel mode, encryption does not happen until just before it leaves the local
network. Traffic likely remains unencrypted between the end user device and the local network
boundary. - CORRECT ANSWER - A security analyst on a local network using
monitoring tools is likely to only be able to read contents of traffic encrypted using IPSec
______ mode.
A. Tunnel
B. Transport
C. Trusted


Chaskey - CORRECT ANSWER - _____ is a lightweight cryptography method for signing
messages (MAC). It boasts a relatively undemanding hardware implementation (only ~3,333
gates required at 1MHz clock rate) making it suitable for IoT implementation.


128 - CORRECT ANSWER - Chaskey has a key size of _____ bits.
A. 256
B. 128
C. 80

,salt - CORRECT ANSWER - A weakness of one-way hashing is that the same piece of
plaintext will result in the same ciphertext unless _____ is applied.
A. Salt
B. Ash
C. Ether


40 - CORRECT ANSWER - The minimum recommended key size to use with RC4 is
_____ bits.
A. 40
B. 20
C. 64


2048 - CORRECT ANSWER - RC4 is a symmetric stream cipher with a variable key size
up to a max of _____ bits.
A. 256
B. 2048
C. 1024


Data Encryption Standard (DES) - CORRECT ANSWER - _____ has a block size of 64
bits, key size of 56 bits, and 16 rounds of substitution & transposition.
A. DES
B. AES
C. RC4


rainbow table - CORRECT ANSWER - A(n) _____ is a collection of precomputed hash
values of actual plaintext passwords used for password cracking.
A. initialization vector
B. key pair
C. rainbow table

, .cer - CORRECT ANSWER - _____ is a common x.509 certificate file type that is used
with both PEM and DER formats.
A. .crt
B. .cer
C. .der


Triple Data Encryption Standard (3DES) - CORRECT ANSWER - _____ has a block size
of 64 bits, key size of 112 bits, and 48 rounds of substitution & transposition.
A. DES
B. RSA
C. 3DES


128, 192, 256 - CORRECT ANSWER - Key sizes used with the Advanced Encryption
Standard (AES) include _____. _____, or _____.
A. 10, 12, 14
B. 128, 192, 256
C. 32, 64, 80


128 - CORRECT ANSWER - The Advanced Encryption Standard (AES) operates using
_____ bit blocks.
A. 128
B. 192
C. 256


80 - CORRECT ANSWER - Skipjack is a symmetric block cipher that uses a ______ bit
key.
A. 64
B. 80

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1074
Member since
1 year
Number of followers
102
Documents
68976
Last sold
1 day ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

170 reviews

5
73
4
30
3
45
2
8
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions