1: | How many possible keys are there for an 8-bit key?
| |
A1: | Answer: c. There are 8 bits in that key, and all those bits can have two different values. To calculate the possible keys, multiply 2 by 2 by 2one time for every bit, or 28. | |
2: | Which type of cipher typically acts on small units of data?
| |
A2: | Answer: b. Stream ciphers encrypt the bits of the message one at a time, and block ciphers take a number of bits and encrypt them as a single unit. | |
3: | What is the maximum key length available with 3DES?
| |
A3: | Answer: b. The maximum key length available with 3DES is 168 bits. | |
4: | The AES has a variable key length. True or False? | |
A4: | Answer: True. AES can use 128-, 192-, or 256-bit keys to encrypt data blocks. | |
5: | The security of the Diffie-Hellman algorithm is based on which of the following?
| |
A5: | Answer: c. The security of the Diffie-Hellman algorithm is based on the difficulty of factoring large primes. | |
6: | What is the length of MD5 output (hash)?
| |
A6: | Answer: b. The length of MD5 output (hash) is 128 bits. | |
7: | What is the length of SHA-1 output (hash)?
| |
A7: | Answer: c. The length of SHA-1 output (hash) is 160 bits. | |
8: | What is eavesdropping?
| |
A8: | Answer: b. Eavesdropping is when an intruder "sniffs" the data transmission between two parties during communications over a public medium. | |
9: | Which protocols can be layered on top of SSL? (Multiple answers are possible.)
| |
A9: | Answer: a, c, and d. HTTP, FTP, and Telnet can be layered on top of SSL. | |
10: | Name the three primary security vulnerabilities for communication over a public network.A10: | Answer: Identity theft, eavesdropping, and man-in-the-middle are the three primary security vulnerabilities for communication over a public network. |