100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada
logo-home
C839v5/D334 Additional Practice UPDATED Exam Questions and CORRECT Answers 9,76 €   Añadir al carrito

Examen

C839v5/D334 Additional Practice UPDATED Exam Questions and CORRECT Answers

 0 vista  0 veces vendidas
  • Grado
  • C839v5/D334
  • Institución
  • C839v5/D334

C839v5/D334 Additional Practice UPDATED Exam Questions and CORRECT Answers 128 - Correct Answer-The hash value in bits for MD5 is ____. A. 128 B. 160 C. 256 variable; fixed - Correct Answer-Hashing involves taking a _____ length input and producing a _____ length output (message digest). ...

[Mostrar más]

Vista previa 4 fuera de 31  páginas

  • 8 de agosto de 2024
  • 31
  • 2024/2025
  • Examen
  • Preguntas y respuestas
  • C839v5/D334
  • C839v5/D334
avatar-seller
C839v5/D334 Additional Practice
UPDATED Exam Questions and
CORRECT Answers

128 - Correct Answer-The hash value in bits for MD5 is ____.
A. 128
B. 160
C. 256


variable; fixed - Correct Answer-Hashing involves taking a _____ length input and producing
a _____ length output (message digest).
A. fixed; fixed
B. variable; fixed
C. fixed; variable


160 - Correct Answer-The hash value in bits for SHA-1 is ____.
A. 128
B. 160
C. 256


128 - Correct Answer-The hash value in bits for MD4 is ____.
A. 128
B. 160
C. 256


Transport - Correct Answer-IPSec ______ mode involves "end-to-end" encryption; i.e. data
remains encrypted from the time it leaves a sender's device to the time it arrives at the
receiver's device.
A. Tunnel
B. Transport

,C. Trusted


Tunnel - Correct Answer-IPSec ______ mode involves encryption from gateway to gateway,
i.e. just through the public network space.
A. Tunnel
B. Transport
C. Trusted


Tunnel


Remember, with tunnel mode, encryption does not happen until just before it leaves the local
network. Traffic likely remains unencrypted between the end user device and the local
network boundary. - Correct Answer-A security analyst on a local network using monitoring
tools is likely to only be able to read contents of traffic encrypted using IPSec ______ mode.
A. Tunnel
B. Transport
C. Trusted


Chaskey - Correct Answer-_____ is a lightweight cryptography method for signing messages
(MAC). It boasts a relatively undemanding hardware implementation (only ~3,333 gates
required at 1MHz clock rate) making it suitable for IoT implementation.


128 - Correct Answer-Chaskey has a key size of _____ bits.
A. 256
B. 128
C. 80


salt - Correct Answer-A weakness of one-way hashing is that the same piece of plaintext will
result in the same ciphertext unless _____ is applied.
A. Salt
B. Ash
C. Ether

,40 - Correct Answer-The minimum recommended key size to use with RC4 is _____ bits.
A. 40
B. 20
C. 64


2048 - Correct Answer-RC4 is a symmetric stream cipher with a variable key size up to a
max of _____ bits.
A. 256
B. 2048
C. 1024


Data Encryption Standard (DES) - Correct Answer-_____ has a block size of 64 bits, key size
of 56 bits, and 16 rounds of substitution & transposition.
A. DES
B. AES
C. RC4


rainbow table - Correct Answer-A(n) _____ is a collection of precomputed hash values of
actual plaintext passwords used for password cracking.
A. initialization vector
B. key pair
C. rainbow table


.cer - Correct Answer-_____ is a common x.509 certificate file type that is used with both
PEM and DER formats.
A. .crt
B. .cer
C. .der


Triple Data Encryption Standard (3DES) - Correct Answer-_____ has a block size of 64 bits,
key size of 112 bits, and 48 rounds of substitution & transposition.
A. DES

, B. RSA
C. 3DES


128, 192, 256 - Correct Answer-Key sizes used with the Advanced Encryption Standard
(AES) include _____. _____, or _____.
A. 10, 12, 14
B. 128, 192, 256
C. 32, 64, 80


128 - Correct Answer-The Advanced Encryption Standard (AES) operates using _____ bit
blocks.
A. 128
B. 192
C. 256


80 - Correct Answer-Skipjack is a symmetric block cipher that uses a ______ bit key.
A. 64
B. 80
C. 112


128-bit key size; 64-bit IV - Correct Answer-Enocoro operates with a key size of ______ bits
and an initialization vector (IV) of _____ bits.
A. 80; 80
B. 128; 64
C. 80; 64


64 - Correct Answer-Skipjack has a block size of _____bits.
A. 64
B. 80
C. 128

Los beneficios de comprar resúmenes en Stuvia estan en línea:

Garantiza la calidad de los comentarios

Garantiza la calidad de los comentarios

Compradores de Stuvia evaluaron más de 700.000 resúmenes. Así estas seguro que compras los mejores documentos!

Compra fácil y rápido

Compra fácil y rápido

Puedes pagar rápidamente y en una vez con iDeal, tarjeta de crédito o con tu crédito de Stuvia. Sin tener que hacerte miembro.

Enfócate en lo más importante

Enfócate en lo más importante

Tus compañeros escriben los resúmenes. Por eso tienes la seguridad que tienes un resumen actual y confiable. Así llegas a la conclusión rapidamente!

Preguntas frecuentes

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

100% de satisfacción garantizada: ¿Cómo funciona?

Nuestra garantía de satisfacción le asegura que siempre encontrará un documento de estudio a tu medida. Tu rellenas un formulario y nuestro equipo de atención al cliente se encarga del resto.

Who am I buying this summary from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller MGRADES. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy this summary for 9,76 €. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

45,681 summaries were sold in the last 30 days

Founded in 2010, the go-to place to buy summaries for 14 years now

Empieza a vender
9,76 €
  • (0)
  Añadir