100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
C839V5/D334 ADDITIONAL PRACTICE EXAM QUESTIONS ND ANSWERS $12.99   Add to cart

Exam (elaborations)

C839V5/D334 ADDITIONAL PRACTICE EXAM QUESTIONS ND ANSWERS

 9 views  0 purchase
  • Course
  • C839V5/D334
  • Institution
  • C839V5/D334

C839V5/D334 ADDITIONAL PRACTICE EXAM QUESTIONS ND ANSWERS

Preview 3 out of 22  pages

  • August 6, 2024
  • 22
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • C839V5/D334
  • C839V5/D334
avatar-seller
GEEKA
C839V5/D334 ADDITIONAL PRACTICE
128 - answer- The hash value in bits for MD5 is ____.
A. 128
B. 160
C. 256

variable; fixed - answer- Hashing involves taking a _____ length input and producing a
_____ length output (message digest).
A. fixed; fixed
B. variable; fixed
C. fixed; variable

160 - answer- The hash value in bits for SHA-1 is ____.
A. 128
B. 160
C. 256

128 - answer- The hash value in bits for MD4 is ____.
A. 128
B. 160
C. 256

Transport - answer- IPSec ______ mode involves "end-to-end" encryption; i.e. data
remains encrypted from the time it leaves a sender's device to the time it arrives at the
receiver's device.
A. Tunnel
B. Transport
C. Trusted

One-time pad - answer- _____ is considered to be unbreakable since it only uses its
cipher code once.

ASCII - answer- _____ encoding involves 8-bit values and supports up to 256
characters.

collision - answer- A _____ occurs when two different input values produce the same
hash signature.
A. collision
B. rainbow
C. tunnel

UTF-16 - answer- _____ is an encoding method with 16-bit values and supports up to
65,536 characters.

,80; 80 - answer- The light-weight symmetric stream cipher Trivium operates with a key
size of ______ bits and an initialization vector (IV) of _____ bits.
A. 80; 80
B. 64; 128
C. 128; 64

hardware security module (HSM) - answer- A _____ is a tamper-evident and intrusion-
resistant physical device that safeguards and manages cryptographic keys and provides
cryptographic processing.
A. TPM
B. HSM
C. DES

trusted platform module (TPM) - answer- A _____ is a dedicated processor that handles
hardware-level encryption; allows the use of full disk encryption on a hard drive in a
manner that minimizes the impact on system performance.
A. TPM
B. HSM
C. PRNG

HMAC - answer- _____ is a message authentication code (MAC) that can be used to
verify the integrity and authentication of the message. It involves hashing the message
with a secret key, and thus differs from standard hashing, which is purely a one-way
function.
A. HMAC
B. Rainbow table
C. Key escrow

Symmetric - answer- _____ ciphers make use of a single secret key for both encryption
and decryption.

01011 - answer- Solve by applying the binary XOR function.
11011
10000

A. 11011
B. 10000
C. 01011

10000 - answer- Solve by applying the binary AND function.
11011
10000

A. 11011
B. 10000
C. 01011

, 11011 - answer- Solve by applying the binary OR function.
11011
10000

A. 11011
B. 10000
C. 01011

1 - answer- 15 mod 7 = _____
A. 5
B. 2.14
C. 1

5 - answer- 12 mod 7 = _____
A. 5
B. 1.7
C. 1

Block, Stream - answer- The two types of symmetric ciphers are _____ and _____
A. Block, Stream
B. CTR, DES
C. Active, Passive

Public key - answer- When encrypting data using asymmetric cryptography, which key
should be shared or distributed to facilitate decryption?
A. Secret key
B. Private key
C. Public key

Block cipher modes - answer- _____ are used to manage how blocks of data are
processed in symmetric encryption.
A. Stream ciphers
B. Block cipher modes
C. Padding

CFB, OFB, CTR - answer- Which symmetric block cipher modes enable the block
cipher to operate like a stream cipher?
A. ECB, DES, ECC
B. CFB, OFB, CTR
C. DSA, RSA, RC6

S-boxes - answer- Symmetric block ciphers make use of _____ to perform substitution
as part the encryption process.
A. p-boxes
B. s-boxes

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller GEEKA. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

73091 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.99
  • (0)
  Add to cart