COREECT ANSWERS || VERIFIED
\.Symmetric - Answer- Which encryption standard uses the same key to encrypt and decrypt
messages?
\.Skipjack - Answer- Which algorithm is designated as a Type 2 product by the National
Security Agency (NSA)?
\.X.509 v3 - Answer- What is the most commonly used format for certificates?
\.Certificate revocation list (CRL) - Answer- What is referenced to determine if a certificate
has been revoked?
\.Sender's public key - Answer- What needs to be installed on end users' computers to allow
them to trust applications that have been digitally signed by the developer?
\.Public Certificate - Answer- Which type of certificate must be certified by an authority to
verify it with other participants?
\.It requires a unique nonce. - Answer- What is an attribute of the Rivest Cipher 4 (RC4)
algorithm?
\.Counter (CTR) - Answer- Which mode generates the key stream with a nonce and
incrementing value?
,\.Counter (CTR) - Answer- Which mode is a stream algorithm that concatenates an
incrementing value with a nonce?
\.CEO's public key - Answer- Which key would an administrator use to encrypt data so only
the CEO can decrypt it?
\.Digest - Answer- What is the result of a hash function?
\.Symmetric encryption - Answer- What is used to efficiently encrypt large files?
\.hvxfirgb - Answer- An administrator needs to encrypt the following word with the Atbash
cipher: security What is the correct ciphertext?
\.Message Digest Algorithm 5 (MD5) - Answer- Which cryptographic algorithm has a 128-bit
hash size?
\.Collision resistance - Answer- Which characteristic makes a hashing function suitable for use
in signature schemes?
\.Partial-message collision - Answer- Which attribute of a hashing function makes a birthday
attack possible?
\.SHA-1 - Answer- Which hash algorithm produces a 160-bit output value?
\.Previous generated ciphertext - Answer- What does cipher block chaining (CBC) use with
the key to encrypt subsequent blocks of plaintext?
, \.Electronic codebook (ECB) - Answer- Which mode produces the same ciphertext from two
identical plaintext blocks?
\.Electronic codebook (ECB) - Answer- Which encryption mode is least secure?
\.P = E (K,C) - Answer- What is the mathematical formula used for symmetric decryption?
\.Rivest-Shamir-Adleman - Answer- Which algorithm relies on factoring the product of large
prime numbers?
\.Pretty Good Privacy (PGP) - Answer- Which encryption technology is a serial combination of
hashing, data compression, symmetric-key cryptography, and public key infrastructure (PKI) and
can be used for encrypting texts, emails, files, and directories or for full disk encryption?
\.Kerckhoffs's principle - Answer- Which concept stipulates that algorithms should be openly
shared and scrutinized, but keys must be absolutely secured?
\.Randomizing the initialization vector - Answer- Which encryption process minimizes known
plaintext attacks against Advanced Encryption Standard (AES)?
\.Salting - Answer- What prevents a rainbow table attack during the encryption process?
\.Larger key size - Answer- Which factor increases the required number of attempts in a
brute-force attack?
\.Key length is too short. - Answer- What is a vulnerability of the Data Encryption Standard
(DES)?