D334 Exam Questions and Answers
100% Pass |Already Graded A+|
Verified and Updated
Buzhash, Cityhash, Spookyhash, and Bernstein are examples of _______
hash solutions. - correct answer -non-cryptographic
_____ allow for a new unique passcode to be created for each instance
based on an initial seed. - correct answer -One Time Passwords (OTP)
The IPSec handshake takes place on UDP port _____ for key exchange. -
correct answer -UDP port 500
What is the protocol number for encapsulating security protocol (ESP)?
- correct answer -50
,What is the protocol number for IPSec Authentication Header (AH)? -
correct answer -51
With SSL/TLS, the tunnel is created with a _____ key method, and then
a signature is created with a defined hashing method. - correct answer -
symmetric
With a _____ tunnel we aim to create a connection from a host
machine to a trusted network, and which is tunneled through a public
network - correct answer -Virtual Private Network (VPN)
_____ involves using subscriber computers to route data packets over
the internet, instead of using publicly available routers. - correct answer
-Onion routing
With the ____ network, the routing is done using computers of
volunteers around the world to route the traffic around the Internet,
and within each hop the chances to trace the original source
significantly reduces. - correct answer -Tor
,Establishing a fingerprint or thumbprint in cryptography is achieved by
_____ algorithms. - correct answer -Hash algorithms such as SHA1 and
MD5
A blockchain mining process where a new block of transactions is added
to the blockchain and transactions within the block are considered to be
processed occurs every ______ minutes or so. - correct answer -10
_____ describes a ledger of transactions that allows the Bitcoin network
to know the number of bitcoins that a given user has in their account. -
correct answer -Blockchain
Bitcoin transactions will be captured by ______ who will compile a list
of the latest transactions. - correct answer -miners
Regarding blockchain, miners receive _____ for successful mining
efforts. - correct answer -rewards
, _____ are programs stored on a blockchain that run when
predetermined conditions are met; they typically are used to automate
the execution of an agreement so that all participants can be
immediately certain of the outcome, without an intermediary's
involvement or time loss. - correct answer -Smart contracts
Within Ethereum applications we define the concept of _____ . This is
basically the unit that is used to measure the amount of work that is
required to perform a single Keccak-256 hash. - correct answer -gas
A _____ backdoor describes an instance where it is where it is
mathematically possible for government agents to crack the encryption,
but no-one else can. - correct answer -NOBUS ('nobody but us')
Cipher cracking method where the intruder uses brute force to decrypt
the ciphertext and tries every possible key. - correct answer -Exhaustive
search