| Objective Assessment| Actual
Questions and Answers Latest
Updated (Graded A+)
Correct
Incorrect
D334 Intro to Cryptography | OA
40
, Don't know?
2 of 60
Term
What is the key size for RC4 with WEP?
A. 40 bits
B. 128 bits
C. 256 bits
D. 512 bits
SHA-1 Bifid
40 bits Stream
Don't know?
3 of 60
Term
Which mechanism mitigates a copy-and-paste attack when using AES?
A. Electronic Code Book (ECB)
B. Output feedback (OFB) loop
,C. Message digest 6 (MD6)
D. Secure Hash Algorithm 1 (SHA-1)
Brute-force Output feedback (OFB) loop
Takes a list of the most common
ECDH
words and tries each entry
Don't know?
4 of 60
Term
Which field displays the hash, or digest, of the certificate in an X.509
certificate?
A. Subject
B. Issuer
C. Version
D. Thumbprint
Give this one a try later!
Bifid Thumbprint
Playfair Symmetric
, Don't know?
5 of 60
Term
Which default port must be open for the IPsec key exchange to be
successful?
A. UDP 162
B. TCP 389
C. TCP 465
D. UDP 500
Give this one a try later!
UDP 500 51
256 40
Don't know?
6 of 60
Term
Why should an asymmetric public key be used to encrypt a symmetric
key that is being sent to one person?
A. It uses the same key to encrypt and decrypt large amounts of