1/27
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which certificate management process involves key recovery?
A: Initialization
B: Issued
C: Cancellation
D: Hold
B
Which algorithm is used to generate the thumbprint of a certificate?
A: RSA
B: 3DES
C: AES
D: SHA-1
D
Large volumes of plaintext need to be encrypted, and the encryption keys need to be securely distributed.
Which approach should be used for encryption and distribution?
A: Encrypt by using symmetric keys and distribute by using asymmetric keys
B: Encrypt by using asymmetric keys and distribute by using symmetric keys
C: Encrypt by using symmetric keys and distribute by using symmetric keys
D: Encrypt by using asymmetric keys and distribute by using asymmetric keys
A
What should an administrator use to import and export all items written using X.509 that are part of a chain of trust?
A: CER
B: Public Key Cryptography Standard (PKCS) #7
C: Public Key Cryptography Standard (PKCS) #12
D: RTF
C
What is the maximum length (in bits) of encryption keys used by the WEP protocol?
A: 40
B: 56
C: 128
D: 256
A
What is a difference between WPA-Enterprise and WPA-Personal?
A: Support for Temporal Key Integrity Protocol
B: Support for an authentication server
C: Use of a session key
D: Use of a 48-bit initialization vector
B
Which cipher is used with WEP?
A: RC5
B: RC4
C: TKIP
D: AES
B
How does TKIP improve WPA over WEP?
A: Implements a RADIUS server
B: Implements a RADIUS server
C: Implements an authentication server
D: Creates an AES encryption key
A
Which mode encrypts each group with the same key, leaving each group independent of the others?
A: ECB
B: CBC
C: CFB
D: OFB
A
Which information protection method has an 80-bit key and operates on 64-bit data blocks?
A: Skipjack
B: IDEA
C: DES
D: Twofish
A
How many transformation rounds does AES use with a 192-bit key?
A: 10
B: 12
C: 14
D: 16
B
How many transformation rounds does AES use with a 128-bit key?
A: 10
B: 12
C: 14
D: 16
A
Which cipher uses a grid to map letters into numeric values?
A: Bifid
B: SHA-1
C: Caesar
D: Vigenere
A
What does a frequency analysis attack to break encryption involve?
A: Analyzing ciphertext to identify text variation and comparing the text to standard English characters
B: Performing an exhaustive search to attempt every possible mapping or key
C: Interfering between two parties and sometimes intercepting or modifying data in the communication stream
D: Identifying part of the ciphertext and the corresponding plaintext
A
Which technique should a security analyst use to determine the key length in a Vigenère cipher?
A: Frequency Analysis
B: Brute Force
C: Kasiski examination
D: Known plaintext
C
What is the length (in bits) of an MD5 hash output?
A: 32
B: 64
C: 128
D: 256
C
How many characters are used in an LM hash password?
A: 7
B: 8
C: 14
D: 16
C
A Windows credential is identified as follows: user:FDA95FBABC199D22LLD3B435B51876KK:199DDFD4EF0E9CD9KMNC6FE771IL124B8:::
What is used to store this password?
A: MD5
B: Bcrypt
C: SHA-512
D: NTLM
D
What is an example of a symmetric algorithm?
A: RSA
B: AES
C: SHA
D: MD5
B
Which two components involved in performing encryption are known to the party that will perform decryption before symmetric encryption is applied?
Choose 2 answers.
A: Cryptographic algorithm
B: Cryptographic key
C: Plaintext content
D: Initialization vector
E: Nonce value
A, B
Which symmetric encryption technique uses a 56-bit key size and a 64-bit block size?
A: AES
B: DES
C: 3DES
D: IDEA
B
Which wireless security standard uses a 128-bit RC4 stream cipher for encrypted communications?
A: WPA
B: WEP
C: VPN
D: GSM
A
What should be used when large amounts of data need to be encrypted and decrypted for secure storage based on groupings of 128, 192, or 256 bits?
A: Symmetric stream
B: Symmetric block
C: Asymmetric public key
D: Asymmetric private key
B
Why is symmetric stream used to encrypt video when speed is a major concern?
A: It signs files and encrypts that hash of the file to verify integrity and authenticity.
B: It encrypts and decrypts data in blocks of characters at a time with a complex algorithm.
C: It encrypts a small amount of information, which is decrypted with a private key.
D: It uses the same key to encrypt and decrypt large amounts of media.
D
Which mechanism mitigates a copy-and-paste attack when using AES?
A: Electronic Code Book (ECB)
B: Output feedback (OFB) loop
C: Message digest 6 (MD6)
D: Secure Hash Algorithm 1 (SHA-1)
B
How is information about Bitcoin transactions stored?
A: Command and control center
B: Platform as a service in the cloud
C: Infrastructure as a service in the cloud
D: Distributed peer-to-peer network
D
What is one of the primary characteristics of a blockchain in the context of Bitcoin?
A: Adding blocks to a blockchain is computationally expensive.
B: The security of the chain in a blockchain is independent of its length.
C: Transactions between each block are chained.
D: Transactions within each block are chained.
A
What is the length (in bits) of the private key used to sign transactions and associated with an individual wallet in the context of Bitcoin?
A: 64
B: 128
C: 256
D: 512
C