100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
C839v5/D334 Additional Practice UPDATED Exam Questions and CORRECT Answers $9.99   Add to cart

Exam (elaborations)

C839v5/D334 Additional Practice UPDATED Exam Questions and CORRECT Answers

 0 view  0 purchase
  • Course
  • C839v5/D334
  • Institution
  • C839v5/D334

C839v5/D334 Additional Practice UPDATED Exam Questions and CORRECT Answers 128 - Correct Answer-The hash value in bits for MD5 is ____. A. 128 B. 160 C. 256 variable; fixed - Correct Answer-Hashing involves taking a _____ length input and producing a _____ length output (message digest). ...

[Show more]

Preview 4 out of 31  pages

  • August 8, 2024
  • 31
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • C839v5/D334
  • C839v5/D334
avatar-seller
MGRADES
C839v5/D334 Additional Practice
UPDATED Exam Questions and
CORRECT Answers

128 - Correct Answer-The hash value in bits for MD5 is ____.
A. 128
B. 160
C. 256


variable; fixed - Correct Answer-Hashing involves taking a _____ length input and producing
a _____ length output (message digest).
A. fixed; fixed
B. variable; fixed
C. fixed; variable


160 - Correct Answer-The hash value in bits for SHA-1 is ____.
A. 128
B. 160
C. 256


128 - Correct Answer-The hash value in bits for MD4 is ____.
A. 128
B. 160
C. 256


Transport - Correct Answer-IPSec ______ mode involves "end-to-end" encryption; i.e. data
remains encrypted from the time it leaves a sender's device to the time it arrives at the
receiver's device.
A. Tunnel
B. Transport

,C. Trusted


Tunnel - Correct Answer-IPSec ______ mode involves encryption from gateway to gateway,
i.e. just through the public network space.
A. Tunnel
B. Transport
C. Trusted


Tunnel


Remember, with tunnel mode, encryption does not happen until just before it leaves the local
network. Traffic likely remains unencrypted between the end user device and the local
network boundary. - Correct Answer-A security analyst on a local network using monitoring
tools is likely to only be able to read contents of traffic encrypted using IPSec ______ mode.
A. Tunnel
B. Transport
C. Trusted


Chaskey - Correct Answer-_____ is a lightweight cryptography method for signing messages
(MAC). It boasts a relatively undemanding hardware implementation (only ~3,333 gates
required at 1MHz clock rate) making it suitable for IoT implementation.


128 - Correct Answer-Chaskey has a key size of _____ bits.
A. 256
B. 128
C. 80


salt - Correct Answer-A weakness of one-way hashing is that the same piece of plaintext will
result in the same ciphertext unless _____ is applied.
A. Salt
B. Ash
C. Ether

,40 - Correct Answer-The minimum recommended key size to use with RC4 is _____ bits.
A. 40
B. 20
C. 64


2048 - Correct Answer-RC4 is a symmetric stream cipher with a variable key size up to a
max of _____ bits.
A. 256
B. 2048
C. 1024


Data Encryption Standard (DES) - Correct Answer-_____ has a block size of 64 bits, key size
of 56 bits, and 16 rounds of substitution & transposition.
A. DES
B. AES
C. RC4


rainbow table - Correct Answer-A(n) _____ is a collection of precomputed hash values of
actual plaintext passwords used for password cracking.
A. initialization vector
B. key pair
C. rainbow table


.cer - Correct Answer-_____ is a common x.509 certificate file type that is used with both
PEM and DER formats.
A. .crt
B. .cer
C. .der


Triple Data Encryption Standard (3DES) - Correct Answer-_____ has a block size of 64 bits,
key size of 112 bits, and 48 rounds of substitution & transposition.
A. DES

, B. RSA
C. 3DES


128, 192, 256 - Correct Answer-Key sizes used with the Advanced Encryption Standard
(AES) include _____. _____, or _____.
A. 10, 12, 14
B. 128, 192, 256
C. 32, 64, 80


128 - Correct Answer-The Advanced Encryption Standard (AES) operates using _____ bit
blocks.
A. 128
B. 192
C. 256


80 - Correct Answer-Skipjack is a symmetric block cipher that uses a ______ bit key.
A. 64
B. 80
C. 112


128-bit key size; 64-bit IV - Correct Answer-Enocoro operates with a key size of ______ bits
and an initialization vector (IV) of _____ bits.
A. 80; 80
B. 128; 64
C. 80; 64


64 - Correct Answer-Skipjack has a block size of _____bits.
A. 64
B. 80
C. 128

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller MGRADES. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

73091 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.99
  • (0)
  Add to cart