Month End Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

Introduction-to-Cryptography Questions and Answers

Question # 6

(What is the correlation between the number of rounds and the key length used in the AES algorithm?)

A.

The number of rounds decreases as the key length increases.

B.

The number of rounds increases as the key length increases.

C.

The key length is the same regardless of the number of rounds.

D.

The number of rounds is the same regardless of the key length.

Full Access
Question # 7

(Which cipher uses shifting letters of the alphabet for encryption?)

A.

SHA-1

B.

Vigenère

C.

Bifid

D.

Caesar

Full Access
Question # 8

(What is a component of a one-time password (OTP) that is needed to guess future iterations of passwords?)

A.

Function

B.

Initialization vector

C.

Encryption algorithm

D.

Seed

Full Access
Question # 9

(An administrator has configured a Virtual Private Network (VPN) connection utilizing IPsec transport mode with Encapsulating Security Payload (ESP) between a server in the corporate office and a client computer in the remote office. In which situation can the packet content be inspected?)

A.

On devices at headquarters and offsite before being sent and after being received

B.

In the headquarters’ and offsite location’s networks after the data has been sent

C.

Only in the offsite location’s network while data is in transit

D.

Only in the headquarters’ network while data is in transit

Full Access
Question # 10

(What is an attribute of RC4 when used with WEP?)

A.

40-bit key

B.

128-bit key

C.

256-bit key

D.

512-bit key

Full Access
Question # 11

(Which wireless security standard uses an authentication server with 802.1X and EAP?)

A.

WPA-PSK

B.

WEP

C.

WPA-Enterprise

D.

TKIP

Full Access
Question # 12

(What is the value of 23 mod 6?)

A.

03

B.

04

C.

05

D.

06

Full Access
Question # 13

(A Linux user password is identified as follows:

$2a$08$AbCh0RCM8p8FGaYvRLI0H.Kng54gcnWCOQYIhas708UEZRQQjGBh4

Which hash algorithm should be used to salt this password?)

A.

NTLM

B.

SHA-512

C.

MD5

D.

bcrypt

Full Access
Question # 14

(Which certificate encoding process is binary-based?)

A.

Public Key Infrastructure (PKI)

B.

Distinguished Encoding Rules (DER)

C.

Rivest–Shamir–Adleman (RSA)

D.

Privacy Enhanced Mail (PEM)

Full Access
Question # 15

(Why should an administrator choose lightweight cryptography?)

A.

The desktop is in a secure area of the building.

B.

The embedded system has limited resources.

C.

The payload requires complex rounds of encryption.

D.

The data requires minimal protection due to the sensitivity level.

Full Access
Question # 16

(Which encryption algorithm uses an 80-bit key and operates on 64-bit data blocks?)

A.

Twofish

B.

Blowfish

C.

Camellia

D.

Skipjack

Full Access
Question # 17

(What is the RC4 encryption key size when utilizing WPA with Temporal Key Integrity Protocol (TKIP)?)

A.

40 bits

B.

56 bits

C.

128 bits

D.

256 bits

Full Access
Question # 18

(Which authentication method allows a web service installed on a network operating system to prove its identity to a customer?)

A.

One-way client authentication

B.

One-way server authentication

C.

Mutual authentication

D.

End-to-end authentication

Full Access