1: | How many possible keys are there for an 8-bit key?- 8
- 82
- 28
- 65,536
|
2: | Which type of cipher typically acts on small units of data?- Block cipher
- Stream cipher
|
3: | What is the maximum key length available with 3DES?- 56 bits
- 168 bits
- 160 bits
- 112 bits
- 128 bits
|
4: | The AES has a variable key length. True or False? |
5: | The security of the Diffie-Hellman algorithm is based on which of the following?- The secrecy of public values
- The extreme amount of time required to perform exponentiation
- The difficulty of factoring large primes
- The secrecy of g and p values
|
6: | What is the length of MD5 output (hash)?- 64 bits
- 128 bits
- 160 bits
- 168 bits
- 256 bits
|
7: | What is the length of SHA-1 output (hash)?- 64 bits
- 128 bits
- 160 bits
- 168 bits
- 256 bits
|
8: | What is eavesdropping?- An intruder gains illegitimate access by posing as an individual who actually can access secured resources.
- An intruder "sniffs" the data transmission between two parties during communications over a public medium.
- An intruder interrupts a dialogue and modifies the data between the two parties. The intruder would take over the entire session in an extreme case.
|
9: | Which protocols can be layered on top of SSL? (Multiple answers are possible.)- HTTP
- OSPF
- FTP
- Telnet
- TFTP
|
10: | Name the three primary security vulnerabilities for communication over a public network.
|