additional practice

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/655

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

656 Terms

1
New cards

128

The hash value in bits for MD5 is ____.

2
New cards

A. 128

3
New cards

B. 160

4
New cards

C. 256

5
New cards

variable; fixed

Hashing involves taking a length input and producing a length output (message digest).

6
New cards

A. fixed; fixed

7
New cards

B. variable; fixed

8
New cards

C. fixed; variable

9
New cards

160

The hash value in bits for SHA-1 is ____.

10
New cards

A. 128

11
New cards

B. 160

12
New cards

C. 256

13
New cards

128

The hash value in bits for MD4 is ____.

14
New cards

A. 128

15
New cards

B. 160

16
New cards

C. 256

17
New cards

Transport

IPSec mode involves "end-to-end" encryption; i.e. data remains encrypted from the time it leaves a sender's device to the time it arrives at the receiver's device.

18
New cards

A. Tunnel

19
New cards

B. Transport

20
New cards

C. Trusted

21
New cards

Tunnel

IPSec mode involves encryption from gateway to gateway, i.e. just through the public network space.

22
New cards

A. Tunnel

23
New cards

B. Transport

24
New cards

C. Trusted

25
New cards

Tunnel

26
New cards
27
New cards

Remember, with tunnel mode, encryption does not happen until just before it leaves the local network. Traffic likely remains unencrypted between the end user device and the local network boundary.

A security analyst on a local network using monitoring tools is likely to only be able to read contents of traffic encrypted using IPSec mode.

28
New cards

A. Tunnel

29
New cards

B. Transport

30
New cards

C. Trusted

31
New cards

Chaskey

_ is a lightweight cryptography method for signing messages (MAC). It boasts a relatively undemanding hardware implementation (only ~3,333 gates required at 1MHz clock rate) making it suitable for IoT implementation.

32
New cards

128

Chaskey has a key size of _ bits.

33
New cards

A. 256

34
New cards

B. 128

35
New cards

C. 80

36
New cards

salt

A weakness of one-way hashing is that the same piece of plaintext will result in the same ciphertext unless _ is applied.

37
New cards

A. Salt

38
New cards

B. Ash

39
New cards

C. Ether

40
New cards

40

The minimum recommended key size to use with RC4 is _ bits.

41
New cards

A. 40

42
New cards

B. 20

43
New cards

C. 64

44
New cards

2048

RC4 is a symmetric stream cipher with a variable key size up to a max of _ bits.

45
New cards

A. 256

46
New cards

B. 2048

47
New cards

C. 1024

48
New cards

Data Encryption Standard (DES)

_ has a block size of 64 bits, key size of 56 bits, and 16 rounds of substitution & transposition.

49
New cards

A. DES

50
New cards

B. AES

51
New cards

C. RC4

52
New cards

rainbow table

A(n) _ is a collection of precomputed hash values of actual plaintext passwords used for password cracking.

53
New cards

A. initialization vector

54
New cards

B. key pair

55
New cards

C. rainbow table

56
New cards

.cer

_ is a common x.509 certificate file type that is used with both PEM and DER formats.

57
New cards

A. .crt

58
New cards

B. .cer

59
New cards

C. .der

60
New cards

Triple Data Encryption Standard (3DES)

_ has a block size of 64 bits, key size of 112 bits, and 48 rounds of substitution & transposition.

61
New cards

A. DES

62
New cards

B. RSA

63
New cards

C. 3DES

64
New cards

128, 192, 256

Key sizes used with the Advanced Encryption Standard (AES) include . , or _.

65
New cards

A. 10, 12, 14

66
New cards

B. 128, 192, 256

67
New cards

C. 32, 64, 80

68
New cards

128

The Advanced Encryption Standard (AES) operates using _ bit blocks.

69
New cards

A. 128

70
New cards

B. 192

71
New cards

C. 256

72
New cards

80

Skipjack is a symmetric block cipher that uses a bit key.

73
New cards

A. 64

74
New cards

B. 80

75
New cards

C. 112

76
New cards

128-bit key size; 64-bit IV

Enocoro operates with a key size of bits and an initialization vector (IV) of _ bits.

77
New cards

A. 80; 80

78
New cards

B. 128; 64

79
New cards

C. 80; 64

80
New cards

64

Skipjack has a block size of _bits.

81
New cards

A. 64

82
New cards

B. 80

83
New cards

C. 128

84
New cards

Light-weight hashing algorithms

PHOTON, SPONGENT, Lesamnta-LW, and Quark are examples of light-weight _.

85
New cards

A. hashing algorithms

86
New cards

B. public-key algorithms

87
New cards

C. symmetric block ciphers

88
New cards

IDEA

_ has a block size of 64 bits, key size of 128 bits, and >17 rounds of substitution & transposition.

89
New cards

A. RSA

90
New cards

B. DSA

91
New cards

C. IDEA

92
New cards

RSA

_ is a partially homomorphic crypto system that leverages prime number characteristics, operates with a 1024-4096 bit variable key size, and 1 round.

93
New cards

A. RSA

94
New cards

B. Diffie-Hellman

95
New cards

C. Chaskey

96
New cards

Symmetric Block

Blowfish and Twofish are both _ ciphers with common key sizes of 128, 192, or 256 bits.

97
New cards

A. symmetric block

98
New cards

B. symmetric stream

99
New cards

C. asymmetric

100
New cards

RC5

_ is a symmetric block cipher that uses block sizes of 32, 64, or 128 bits and boasts a variable key size up to 2048 bits.