1/164
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
128
The hash value in bits for MD5 is ____.
A. 128
B. 160
C. 256
variable; fixed
Hashing involves taking a _____ length input and producing a _____ length output (message digest).
A. fixed; fixed
B. variable; fixed
C. fixed; variable
160
The hash value in bits for SHA-1 is ____.
A. 128
B. 160
C. 256
128
The hash value in bits for MD4 is ____.
A. 128
B. 160
C. 256
Transport
IPSec ______ mode involves "end-to-end" encryption; i.e. data remains encrypted from the time it leaves a sender's device to the time it arrives at the receiver's device.
A. Tunnel
B. Transport
C. Trusted
Tunnel
IPSec ______ mode involves encryption from gateway to gateway, i.e. just through the public network space.
A. Tunnel
B. Transport
C. Trusted
Tunnel
Remember, with tunnel mode, encryption does not happen until just before it leaves the local network. Traffic likely remains unencrypted between the end user device and the local network boundary.
A security analyst on a local network using monitoring tools is likely to only be able to read contents of traffic encrypted using IPSec ______ mode.
A. Tunnel
B. Transport
C. Trusted
Chaskey
_____ is a lightweight cryptography method for signing messages (MAC). It boasts a relatively undemanding hardware implementation (only ~3,333 gates required at 1MHz clock rate) making it suitable for IoT implementation.
128
Chaskey has a key size of _____ bits.
A. 256
B. 128
C. 80
salt
A weakness of one-way hashing is that the same piece of plaintext will result in the same ciphertext unless _____ is applied.
A. Salt
B. Ash
C. Ether
40
The minimum recommended key size to use with RC4 is _____ bits.
A. 40
B. 20
C. 64
2048
RC4 is a symmetric stream cipher with a variable key size up to a max of _____ bits.
A. 256
B. 2048
C. 1024
Data Encryption Standard (DES)
_____ has a block size of 64 bits, key size of 56 bits, and 16 rounds of substitution & transposition.
A. DES
B. AES
C. RC4
rainbow table
A(n) _____ is a collection of precomputed hash values of actual plaintext passwords used for password cracking.
A. initialization vector
B. key pair
C. rainbow table
.cer
_____ is a common x.509 certificate file type that is used with both PEM and DER formats.
A. .crt
B. .cer
C. .der
Triple Data Encryption Standard (3DES)
_____ has a block size of 64 bits, key size of 112 bits, and 48 rounds of substitution & transposition.
A. DES
B. RSA
C. 3DES
128, 192, 256
Key sizes used with the Advanced Encryption Standard (AES) include _____. _____, or _____.
A. 10, 12, 14
B. 128, 192, 256
C. 32, 64, 80
128
The Advanced Encryption Standard (AES) operates using _____ bit blocks.
A. 128
B. 192
C. 256
80
Skipjack is a symmetric block cipher that uses a ______ bit key.
A. 64
B. 80
C. 112
128-bit key size; 64-bit IV
Enocoro operates with a key size of ______ bits and an initialization vector (IV) of _____ bits.
A. 80; 80
B. 128; 64
C. 80; 64
64
Skipjack has a block size of _____bits.
A. 64
B. 80
C. 128
Light-weight hashing algorithms
PHOTON, SPONGENT, Lesamnta-LW, and Quark are examples of light-weight _____.
A. hashing algorithms
B. public-key algorithms
C. symmetric block ciphers
IDEA
_____ has a block size of 64 bits, key size of 128 bits, and >17 rounds of substitution & transposition.
A. RSA
B. DSA
C. IDEA
RSA
_______ is a partially homomorphic crypto system that leverages prime number characteristics, operates with a 1024-4096 bit variable key size, and 1 round.
A. RSA
B. Diffie-Hellman
C. Chaskey
Symmetric Block
Blowfish and Twofish are both _____ ciphers with common key sizes of 128, 192, or 256 bits.
A. symmetric block
B. symmetric stream
C. asymmetric
RC5
_____ is a symmetric block cipher that uses block sizes of 32, 64, or 128 bits and boasts a variable key size up to 2048 bits.
A. RC2
B. RC4
C. RC5
64 or 112
Quark produces a hash value of _____bits.
A. 128
B. 64 or 112
C. 80 or 128
64
The block size used with XTEA is _____ bits.
A. 56
B. 64
C. 80
128
The key size used with XTEA is _____ bits.
A. 128
B. 256
C. 2048
Symmetric block cipher
Camelia is a _____.
A. Hash Algorithm
B. Symmetric block cipher
C. Symmetric key exchange algorithm
Symmetric Block Cipher
RC6 can best be described as a _____.
A. Lightweight Hash Algorithm
B. Symmetric Stream Cipher
C. Symmetric Block Cipher
40
RC2 has a block size of 64 bits and variable key size up to 128 bits. What is the minimum recommended key size to use when employing RC2?
A. 1
B. 40
C. 64
80; 80
The light-weight symmetric steam cipher Mickey v2 operates with a key size of ______ bits and an initialization vector (IV) variable up to _____ bits.
A. 80; 80
B. 64; 128
C. 128; 64
Symmetric stream cipher
RC4 is a(n) _____.
A. Symmetric block cipher
B. Symmetric stream cipher
C. Asymmetric algorithm
certificate signing request (CSR)
An entity seeking to obtain a digital certificate must generate and submit a _____ request to a certificate authority to request the certificate.
A. certificate binding
B. certificate signing
C. certificate initialization
Symmetric stream cipher
ChaCha is a(n) _____.
A. Symmetric block cipher
B. Symmetric stream cipher
C. Asymmetric algorithm
Asymmetric algorithms
RSA and DSA are both_____.
A. Hash algorithms
B. Symmetric stream ciphers
C. Asymmetric algorithms
Diffie-Hellman
_____ provides a method for key exchange using a one-way function.
A. A hash algorithm
B. Quark
C. Diffie-Hellman
Chaskey
_____ is a Lightweight cryptography method for signing messages (MAC).
A. Chaskey
B. Diffie-Hellman
C. Vigenere
40
WEP uses _____-bit RC4.
A. 40
B. 128
C. 256
asymmetric key pair
An entity seeking to obtain a digital certificate must first generate a _____ for themselves.
A. secret key
B. asymmetric key pair
C. registration authority
128
WPA uses _____-bit RC4.
A. 40
B. 128
C. 256
AES
Wi-Fi Protected Access 2 (WPA2) uses 128-bit _____.
A. RC4
B. AES
C. ECC
Mono-alphabetic
_____ substitution is where a single mapping from our alphabet to a cipher alphabet is created.
A. Mono-alphabetic
B. Polyalphabetic
C. Pseudo-random
Sign the certificate with the CA's own private key
What step will a certificate authority (CA) take after generating a digital certificate for a requester, but before issuing the certificate to that requester?
A. Sign the certificate with the CA's own private key
B. Sign the certificate with the CA's own public key
C. Sign the certificate with the requester's private key
Polyalphabetic
_______ refers to the mapping of our alphabet to a number of cipher alphabets.
A. Mono-alphabetic
B. Polyalphabetic
C. Pseudo-random
One-time pad
_____ is considered to be unbreakable since it only uses its cipher code once.
ASCII
_____ encoding involves 8-bit values and supports up to 256 characters.
collision
A _____ occurs when two different input values produce the same hash signature.
A. collision
B. rainbow
C. tunnel
UTF-16
_____ is an encoding method with 16-bit values and supports up to 65,536 characters.
80; 80
The light-weight symmetric stream cipher Trivium operates with a key size of ______ bits and an initialization vector (IV) of _____ bits.
A. 80; 80
B. 64; 128
C. 128; 64
hardware security module (HSM)
A _____ is a tamper-evident and intrusion-resistant physical device that safeguards and manages cryptographic keys and provides cryptographic processing.
A. TPM
B. HSM
C. DES
trusted platform module (TPM)
A _____ is a dedicated processor that handles hardware-level encryption; allows the use of full disk encryption on a hard drive in a manner that minimizes the impact on system performance.
A. TPM
B. HSM
C. PRNG
HMAC
_____ is a message authentication code (MAC) that can be used to verify the integrity and authentication of the message. It involves hashing the message with a secret key, and thus differs from standard hashing, which is purely a one-way function.
A. HMAC
B. Rainbow table
C. Key escrow
Symmetric
_____ ciphers make use of a single secret key for both encryption and decryption.
01011
Solve by applying the binary XOR function.
1 1 0 1 1
1 0 0 0 0
A. 11011
B. 10000
C. 01011
10000
Solve by applying the binary AND function.
11011
10000
A. 11011
B. 10000
C. 01011
11011
Solve by applying the binary OR function.
11011
10000
A. 11011
B. 10000
C. 01011
1
15 mod 7 = _____
A. 5
B. 2.14
C. 1
5
12 mod 7 = _____
A. 5
B. 1.7
C. 1
Block, Stream
The two types of symmetric ciphers are _____ and _____
A. Block, Stream
B. CTR, DES
C. Active, Passive
Public key
When encrypting data using asymmetric cryptography, which key should be shared or distributed to facilitate decryption?
A. Secret key
B. Private key
C. Public key
Block cipher modes
_____ are used to manage how blocks of data are processed in symmetric encryption.
A. Stream ciphers
B. Block cipher modes
C. Padding
CFB, OFB, CTR
Which symmetric block cipher modes enable the block cipher to operate like a stream cipher?
A. ECB, DES, ECC
B. CFB, OFB, CTR
C. DSA, RSA, RC6
S-boxes
Symmetric block ciphers make use of _____ to perform substitution as part the encryption process.
A. p-boxes
B. s-boxes
C. IVs
64
PRESENT is a light-weight symmetric block cipher with a key size of 80 or 128 bits, 32 rounds, and ______ bit block size.
A. 32
B. 64
C. 128
Asymmetric
______ cryptography makes use of a key pair (one public, one private) to perform encryption and decryption. If a given key in a key pair is used for encryption, only the opposite key in that key pair can perform the reverse decryption.
A. Symmetric
B. Asymmetric
C. Hash
Secret key
When encrypting data using symmetric cryptography, which key may need to be exchanged to facilitate decryption?
A. Secret key
B. Private key
C. Public key
2048
RC5 is a conventional symmetric block cipher that is suitable for light-weight implementations. It has a variable key size with a max of _____bits.
A. 128
B. 256
C. 2048
128 bit blocks; 128, 192, or 256 bit keys
What is the block and key size in bits used by the light-weight symmetric block cipher CLEFIA?
A. 64 bit blocks; 64 bit keys
B. 64 or 80 bit blocks; 128 bit keys
C. 128 bit blocks; 128, 192, or 256 bit keys
Sue's private key
If Shawn employs public key cryptography to send Sue a digitally signed message, which key will Sue use to decrypt the message?
A. Sue's private key
B. Shawn's private key
C. Sue's public key
Cramer-Shoup
_____ is a public key encryption method that is an extension of El Gamal but adds a one-way hashing method which protects against an adaptive chosen ciphertext attack.
A. Cramer-Shoup
B. Ephemeral
C. Key Clustering
Homomorphic
With _____ encryption, we can perform mathematical operations on ciphered values i.e., before decryption.
A. Polyalphabetic
B. Homomorphic
C. Quantum
TOTP
_____ allows for a new unique passcode to be created for each instance, based on an initial seed and for a given time period.
A. One Time Passwords (OTP)
B. Hashed One Time Passwords (HOTP)
C. Timed One Time Password (TOTP)
PEM
Which encoding scheme for x.509 certificates supports Base64 and ASCII formats?
A. DER
B. PEM
C. MAC
Shawn's private key
If Shawn plans to employ asymmetric cryptography to send Sue a digitally signed message, which key will Shawn use to sign the message?
A. Sue's private key
B. Shawn's private key
C. Sue's public key
Shawn's public key
If Shawn employs public key cryptography to send Sue a digitally signed message, which key will Sue use to verify the message?
A. Sue's private key
B. Shawn's public key
C. Sue's public key
symmetric stream
Rabbit, Mickey v2, Trivium, Grain, and Enocoro are examples of light-weight _____ ciphers.
A. Symmetric block
B. Symmetric stream
C. Public-key
Sue's public key
If Shawn plans to employ public key cryptography to send Sue a digitally signed message, which key will Shawn use to encrypt the message?
A. Sue's private key
B. Sue's public key
C. Shawn's public key
DER
Which encoding scheme for x.509 certificates supports binary formats?
A. DER
B. PEM
C. MAC
Hashing
_____ describes one-way or irreversible encryption used for protecting the integrity of data and in authentication applications.
A. Symmetric encryption
B. Hashing
C. Key escrow
conventional
NIST categorizes servers, desktops, tablets and smart phones as devices within the device spectrum for _____cryptography.
A. non-cryptographic
B. light-weight
C. conventional
light-weight
NIST categorizes embedded systems, RFID, and sensor networks as devices within the device spectrum for _____cryptography.
A. non-cryptographic
B. light-weight
C. conventional
HOTP
_____ allows a new unique passcode to be created each instance, based on a counter value and an initial seed.
A. One Time Passwords (OTP)
B. Hashed One Time Passwords (HOTP)
C. Timed One Time Password (TOTP)
Quantum
_____ computers have fast multiplication circuits, and thus can be used to perform multiplications and search a range of prime numbers at a speed which would break most existing RSA implementations.
A.RFID
B. Quantum
C. Light-weight
SIMON
_____ is a light-weight symmetric block cipher with variable block sizes, key sizes, and rounds, that is optimized for
hardware implementations.
A. SIMON
B. SPECK
C. PRESENT
SPECK
_____ is a light-weight symmetric block cipher with variable block sizes, key sizes, and rounds, that is optimized for
software implementations.
A. SIMON
B. SPECK
C. PRESENT
AES
PRESENT is a symmetric block cipher that was one of the first to be considered as a(n) _____ replacement for light-weight implementations.
A. AES
B. BIFID
C. CBC
128 bit keys; 64 bit IV
Rabbit operates with a key size of ______ bits and an initialization vector (IV) of _____ bits.
A. 80; 80
B. 64; 128
C. 128; 64
Skipjack
______ is a secret key encryption algorithm, designed by the NSA, and was used with the Clipper chip.
A. Blowfish
B. Twofish
C. Skipjack
24
The IV used with WEP is ____ bits.
A. 24
B. 48
C 12
48
The IV used with WPA is _____ bits.
A. 24
B. 48
C 12
PSK; enterprise
Two variations of WPA are ____ and ____.
A. MIC; MOC
B. PSK; enterprise
C. transport; tunnel
3GPP
A5/3 is for _____ , and is based on the MISTY1 cipher.
A. key transport
B. GSM
C. 3GPP
GSM
A5/1 is designed to be used for the _____ network.
A. key transport
B. GSM
C. 3GPP
ChaCha20
Google proposed _____ as an alternative to AES to be used with TLS connections.
A. ChaCha20
B. DES
C. WPA
Elli
_____ is a light-weight public key solution that uses Elliptic Curves along with a Diffie-Hellman related handshake between the RFID tag and the RFID reader in RFID implementations.
A. ECC
B. AES
C. Elli
non-cryptographic
Buzhash, Cityhash, Spookyhash, and Bernstein are examples of _______ hash solutions.
A. light-weight
B. quantum
C. non-cryptographic
OTP
_____ allow for a new unique passcode to be created for each instance based on an initial seed.
A. One Time Passwords (OTP)
B. Hashed One Time Passwords (HOTP)
C. Timed One Time Password (TOTP)
UDP port 500
The IPSec handshake takes place on UDP port _____ for key exchange.
A. 500
B. 50
C. 51