Answers 2025-2026 Verified 100%.
The hash value in bits for MD5 is .
- CORRECT ANS>>128
Hashing involves taking a length input and producing a length output (message digest).
- CORRECT ANS>>variable; fixed
The hash value in bits for SHA-1 is .
- CORRECT ANS>>160
The hash value in bits for MD4 is .
- CORRECT ANS>>128
IPSec mode involves "end-to-end" encryption; i.e. data remains encrypted from the time it leaves a
sender's device to the time it arrives at the receiver's device.
- CORRECT ANS>>Transport
IPSec mode involves encryption from gateway to gateway, i.e. just through the public network space.
- CORRECT ANS>>Tunnel
A security analyst on a local network using monitoring tools is likely to only be able to read contents of
traffic encrypted using IPSec mode.
- CORRECT ANS>>Tunnel
Remember, with tunnel mode, encryption does not happen until just before it leaves the local network.
Traffic likely remains unencrypted between the end user device and the local network boundary.
is a lightweight cryptography method for signing messages (MAC). It boasts a relatively
undemanding hardware implementation (only ~3,333 gates required at 1MHz clock rate) making it
suitable for IoT implementation. - CORRECT ANS>>Chaskey
Chaskey has a key size of bits.
- CORRECT ANS>>128
A weakness of one-way hashing is that the same piece of plaintext will result in the same ciphertext
unless is applied.
- CORRECT ANS>>salt
, The minimum recommended key size to use with RC4 is bits.
- CORRECT ANS>>40
RC4 is a symmetric stream cipher with a variable key size up to a max of bits.
- CORRECT ANS>>2048
has a block size of 64 bits, key size of 56 bits, and 16 rounds of substitution & transposition.
- CORRECT ANS>>Data Encryption Standard (DES)
A(n) is a collection of precomputed hash values of actual plaintext passwords used for password
cracking.
- CORRECT ANS>>rainbow table
is a common x.509 certificate file type that is used with both PEM and DER formats.
- CORRECT ANS>>.cer
has a block size of 64 bits, key size of 112 bits, and 48 rounds of substitution & transposition.
- CORRECT ANS>>Triple Data Encryption Standard (3DES)
Key sizes used with the Advanced Encryption Standard (AES) include . , or .
- CORRECT ANS>>128, 192, 256
The Advanced Encryption Standard (AES) operates using bit blocks.
- CORRECT ANS>>128
Skipjack is a symmetric block cipher that uses a bit key.
- CORRECT ANS>>80
Enocoro operates with a key size of bits and an initialization vector (IV) of bits.
- CORRECT ANS>>128-bit key size; 64-bit IV
Skipjack has a block size of bits.
- CORRECT ANS>>64
PHOTON, SPONGENT, Lesamnta-LW, and Quark are examples of light-weight
- CORRECT ANS>>Light-weight hashing algorithms
has a block size of 64 bits, key size of 128 bits, and >17 rounds of substitution & transposition.
- CORRECT ANS>>IDEA