1:
| How many possible keys are there for an 8-bit key?- 8
- 82
- 28
- 65,536
|
A1:
| Answer: c. There are 8 bits in that key, and all those bits can have two different values. To calculate the possible keys, multiply 2 by 2 by 2one time for every bit, or 28. |
2:
| Which type of cipher typically acts on small units of data?- Block cipher
- Stream cipher
|
A2:
| Answer: b. Stream ciphers encrypt the bits of the message one at a time, and block ciphers take a number of bits and encrypt them as a single unit. |
3:
| What is the maximum key length available with 3DES?- 56 bits
- 168 bits
- 160 bits
- 112 bits
- 128 bits
|
A3:
| Answer: b. The maximum key length available with 3DES is 168 bits. |
4:
| The AES has a variable key length. True or False? |
A4:
| Answer: True. AES can use 128-, 192-, or 256-bit keys to encrypt data blocks. |
5:
| The security of the Diffie-Hellman algorithm is based on which of the following?- The secrecy of public values
- The extreme amount of time required to perform exponentiation
- The difficulty of factoring large primes
- The secrecy of g and p values
|
A5:
| Answer: c. The security of the Diffie-Hellman algorithm is based on the difficulty of factoring large primes. |
6:
| What is the length of MD5 output (hash)?- 64 bits
- 128 bits
- 160 bits
- 168 bits
- 256 bits
|
A6:
| Answer: b. The length of MD5 output (hash) is 128 bits. |
7:
| What is the length of SHA-1 output (hash)?- 64 bits
- 128 bits
- 160 bits
- 168 bits
- 256 bits
|
A7:
| Answer: c. The length of SHA-1 output (hash) is 160 bits. |
8:
| What is eavesdropping?- An intruder gains illegitimate access by posing as an individual who actually can access secured resources.
- An intruder "sniffs" the data transmission between two parties during communications over a public medium.
- An intruder interrupts a dialogue and modifies the data between the two parties. The intruder would take over the entire session in an extreme case.
|
A8:
| Answer: b. Eavesdropping is when an intruder "sniffs" the data transmission between two parties during communications over a public medium. |
9:
| Which protocols can be layered on top of SSL? (Multiple answers are possible.)- HTTP
- OSPF
- FTP
- Telnet
- TFTP
|
A9:
| Answer: a, c, and d. HTTP, FTP, and Telnet can be layered on top of SSL. |
10:
| Name the three primary security vulnerabilities for communication over a public network.A10:
| Answer: Identity theft, eavesdropping, and man-in-the-middle are the three primary security vulnerabilities for communication over a public network. |