Assessment| 165 Actual Questions and Answers Latest
Updated 2025/2026 (Graded A+)
The hash value in bits for MD5 is ____.
A. 128
B. 160
C. 256 - Correct Answer-128
Hashing involves taking a _____ length input and producing a _____ length
output (message digest).
A. fixed; fixed
B. variable; fixed
C. fixed; variable - Correct Answer-variable; fixed
The hash value in bits for SHA-1 is ____.
A. 128
B. 160
C. 256 - Correct Answer-160
The hash value in bits for MD4 is ____.
A. 128
B. 160
C. 256 - Correct Answer-128
IPSec ______ mode involves "end-to-end" encryption; i.e. data remains
encrypted from the time it leaves a sender's device to the time it arrives at the
receiver's device.
A. Tunnel
B. Transport
C. Trusted - Correct Answer-Transport
,IPSec ______ mode involves encryption from gateway to gateway, i.e. just
through the public network space.
A. Tunnel
B. Transport
C. Trusted - Correct Answer-Tunnel
A security analyst on a local network using monitoring tools is likely to only be
able to read contents of traffic encrypted using IPSec ______ mode.
A. Tunnel
B. Transport
C. Trusted - Correct Answer-Tunnel
Remember, with tunnel mode, encryption does not happen until just before it
leaves the local network. Traffic likely remains unencrypted between the end
user device and the local network boundary.
_____ is a lightweight cryptography method for signing messages (MAC). It
boasts a relatively undemanding hardware implementation (only ~3,333 gates
required at 1MHz clock rate) making it suitable for IoT implementation. -
Correct Answer-Chaskey
Chaskey has a key size of _____ bits.
A. 256
B. 128
C. 80 - Correct Answer-128
A weakness of one-way hashing is that the same piece of plaintext will result in
the same ciphertext unless _____ is applied.
A. Salt
B. Ash
C. Ether - Correct Answer-salt
The minimum recommended key size to use with RC4 is _____ bits.
A. 40
, B. 20
C. 64 - Correct Answer-40
RC4 is a symmetric stream cipher with a variable key size up to a max of _____
bits.
A. 256
B. 2048
C. 1024 - Correct Answer-2048
_____ has a block size of 64 bits, key size of 56 bits, and 16 rounds of
substitution & transposition.
A. DES
B. AES
C. RC4 - Correct Answer-Data Encryption Standard (DES)
A(n) _____ is a collection of precomputed hash values of actual plaintext
passwords used for password cracking.
A. initialization vector
B. key pair
C. rainbow table - Correct Answer-rainbow table
_____ is a common x.509 certificate file type that is used with both PEM and
DER formats.
A. .crt
B. .cer
C. .der - Correct Answer-.cer
_____ has a block size of 64 bits, key size of 112 bits, and 48 rounds of
substitution & transposition.
A. DES
B. RSA
C. 3DES - Correct Answer-Triple Data Encryption Standard (3DES)
Key sizes used with the Advanced Encryption Standard (AES) include _____.
_____, or _____.