ログイン

crypto pretest
51問 • 8ヶ月前
  • ユーザ名非公開
  • 通報

    問題一覧

  • 1

    What should an administrator use to import and export all items written using X.509 that are part of a chain of trust?

    Public Key Cryptography Standard (PKCS) #12

  • 2

    Which field displays the hash, or digest, of the certificate in an X.509 certificate?

    Thumbprint

  • 3

    What is an example of a symmetric algorithm?

    AES

  • 4

    Which two components involved in performing encryption are known to the party that will perform decryption before symmetric encryption is applied? Choose 2 answers.

    Cryptographic algorithm, Cryptographic key

  • 5

    Which type of cipher is ChaCha?

    Stream

  • 6

    What is the key size for RC4 with WEP?

    40 bits

  • 7

    Which symmetric encryption technique uses a 56-bit key size and a 64-bit block size?

    DES

  • 8

    Which symmetric encryption technique uses a 56-bit key size and a 64-bit block size?

    WPA

  • 9

    What is the length (in bits) of an MD5 hash output?

    128

  • 10

    How many characters are used in an LM hash password?

    14

  • 11

    A Windows credential is identified as follows: user:FDA95FBABC199D22LLD3B435B51876KK:199DDFD4EF0E9CD9KMNC6FE771IL124B8::: What is used to store this password?

    NTLM

  • 12

    Which mode encrypts each group with the same key, leaving each group independent of the others?

    ECB

  • 13

    Which mode of block encryption results in the same outcome for matching blocks of a plaintext message?

    ELECTRONIC CODE BOOK (ECB)

  • 14

    How does CBC mode encryption function?

    Uses an initialization vector (IV) to encrypt the first block, then uses the result of the encryption to encrypt the next block

  • 15

    Which encryption mode always produces the same result for the same plaintext?

    ECB

  • 16

    Which information protection method has an 80-bit key and operates on 64-bit data blocks?

    SKIPJACK

  • 17

    How many transformation rounds does AES use with a 192-bit key?

    12

  • 18

    How many transformation rounds does AES use with a 128-bit key?

    10

  • 19

    Which encryption algorithm did the National Institute of Standards and Technology (NIST) designate as a specification for the encryption of electronic information?

    AES

  • 20

    A security analyst decrypted a data set with the same key that originally encrypted the data set. Which cryptographic operation did the analyst use?

    SYMMETRIC

  • 21

    What should be used when large amounts of data need to be encrypted and decrypted for secure storage based on groupings of 128, 192, or 256 bits?

    SYMMETRIC BLOCK

  • 22

    Why should an asymmetric public key be used to encrypt a symmetric key that is being sent to one person?

    It encrypts a small amount of information, which is decrypted with the corresponding private key.

  • 23

    Which mechanism mitigates a copy-and-paste attack when using AES?

    Output feedback (OFB) loop

  • 24

    Which mechanism can be used to ensure perfect forward secrecy during key exchange when using symmetric encryption?

    ECDH

  • 25

    Which encryption component ensures that the compromise of a long-term key prevents the compromise of any previous session keys?

    FORWARD SECRECY

  • 26

    What can XOR use as a pseudorandom number to create unique ciphertext?

    Initialization vector

  • 27

    How does cipher block chaining (CBC) create randomness in a second block after encrypting the first block with an initialization vector (IV)?

    Uses the results of the IV to encrypt the next block

  • 28

    How is information about Bitcoin transactions stored?

    Distributed peer-to-peer network

  • 29

    What is one of the primary characteristics of a blockchain in the context of Bitcoin?

    Transactions between each block are chained.

  • 30

    What is the length (in bits) of the private key used to sign transactions and associated with an individual wallet in the context of Bitcoin?

    256

  • 31

    Which certificate management process involves key recovery?

    ISSUED

  • 32

    Which task does a root CA perform before publishing its own certificate?

    Signing it with its private key

  • 33

    Which algorithm is used to generate the thumbprint of a certificate?

    SHA-1

  • 34

    Large volumes of plaintext need to be encrypted, and the encryption keys need to be securely distributed. Which approach should be used for encryption and distribution?

    Encrypt by using symmetric keys and distribute by using asymmetric keys

  • 35

    What is the role of a key in asymmetric encryption and decryption?

    A public key is used for encryption, and a private key is used for decryption.

  • 36

    A security analyst is validating the integrity and authenticity of a data transaction. Which PKI component is being used?

    DIGITAL SIGNATURE

  • 37

    Which PKI component generates digital certificates?

    Certificate authority (CA)

  • 38

    What is the maximum length (in bits) of encryption keys used by the WEP protocol?

    40

  • 39

    What is a difference between WPA-Enterprise and WPA-Personal?

    Support for an authentication server

  • 40

    Which cipher is used with WEP?

    RC4

  • 41

    How does TKIP improve WPA over WEP?

    Hashes the initialization vector and secret key

  • 42

    Which default port must be open for the IPsec key exchange to be successful?

    UDP 500

  • 43

    Which protocol indicates the virtual private network (VPN) is using Authentication Header (AH)?

    51

  • 44

    Which cipher uses a grid to map letters into numeric values?

    BIFID

  • 45

    Which cipher uses a five-by-five matrix with nonrepeating characters?

    PLAYFAIR

  • 46

    What does a frequency analysis attack to break encryption involve?

    Analyzing ciphertext to identify text variation and comparing the text to standard English characters

  • 47

    Which technique should a security analyst use to determine the key length in a Vigenère cipher?

    Kasiski examination

  • 48

    Which attack tries every combination of letters, numbers, and special characters?

    BRUTE-FORCE

  • 49

    How does a dictionary attack break a cipher?

    Takes a list of the most common words and tries each entry

  • 50

    What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?

    It forwards the frame out of all ports except for the port at which the frame was received.

  • 51

    What are two features of ARP? (Choose two.)

    If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast. , If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply.

  • Weekly Test 1

    Weekly Test 1

    ユーザ名非公開 · 50問 · 13日前

    Weekly Test 1

    Weekly Test 1

    50問 • 13日前
    ユーザ名非公開

    WT 1

    WT 1

    ユーザ名非公開 · 50問 · 13日前

    WT 1

    WT 1

    50問 • 13日前
    ユーザ名非公開

    Practical Problems and Experiences REFRESHER 1

    Practical Problems and Experiences REFRESHER 1

    ユーザ名非公開 · 100問 · 13日前

    Practical Problems and Experiences REFRESHER 1

    Practical Problems and Experiences REFRESHER 1

    100問 • 13日前
    ユーザ名非公開

    Plumbing Arithmetic Terms 4

    Plumbing Arithmetic Terms 4

    ユーザ名非公開 · 27問 · 13日前

    Plumbing Arithmetic Terms 4

    Plumbing Arithmetic Terms 4

    27問 • 13日前
    ユーザ名非公開

    Plumbing Arithmetic Terms 3

    Plumbing Arithmetic Terms 3

    ユーザ名非公開 · 49問 · 13日前

    Plumbing Arithmetic Terms 3

    Plumbing Arithmetic Terms 3

    49問 • 13日前
    ユーザ名非公開

    Plumbing Arithmetic Terms 2

    Plumbing Arithmetic Terms 2

    ユーザ名非公開 · 47問 · 13日前

    Plumbing Arithmetic Terms 2

    Plumbing Arithmetic Terms 2

    47問 • 13日前
    ユーザ名非公開

    Plumbing Arithmetic Terms 1

    Plumbing Arithmetic Terms 1

    ユーザ名非公開 · 49問 · 13日前

    Plumbing Arithmetic Terms 1

    Plumbing Arithmetic Terms 1

    49問 • 13日前
    ユーザ名非公開

    Plumbing Tools 2

    Plumbing Tools 2

    ユーザ名非公開 · 53問 · 13日前

    Plumbing Tools 2

    Plumbing Tools 2

    53問 • 13日前
    ユーザ名非公開

    Plumbing Tools 1

    Plumbing Tools 1

    ユーザ名非公開 · 87問 · 13日前

    Plumbing Tools 1

    Plumbing Tools 1

    87問 • 13日前
    ユーザ名非公開

    (Finals) Professional issues in Information Technology Mocktest BSIT 505

    (Finals) Professional issues in Information Technology Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 27問 · 1ヶ月前

    (Finals) Professional issues in Information Technology Mocktest BSIT 505

    (Finals) Professional issues in Information Technology Mocktest BSIT 505

    27問 • 1ヶ月前
    Xai Alexandrei Delos Reyes

    (Finals) Application Development Mocktest BSIT 505

    (Finals) Application Development Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 62問 · 1ヶ月前

    (Finals) Application Development Mocktest BSIT 505

    (Finals) Application Development Mocktest BSIT 505

    62問 • 1ヶ月前
    Xai Alexandrei Delos Reyes

    Competence 6

    Competence 6

    Emm · 146問 · 2ヶ月前

    Competence 6

    Competence 6

    146問 • 2ヶ月前
    Emm

    2 ) Logging Levels

    2 ) Logging Levels

    The R.S.S.H Delivery Company · 15問 · 3ヶ月前

    2 ) Logging Levels

    2 ) Logging Levels

    15問 • 3ヶ月前
    The R.S.S.H Delivery Company

    21 ) SY EX. 5 | COMPLETE

    21 ) SY EX. 5 | COMPLETE

    The R.S.S.H Delivery Company · 91問 · 5ヶ月前

    21 ) SY EX. 5 | COMPLETE

    21 ) SY EX. 5 | COMPLETE

    91問 • 5ヶ月前
    The R.S.S.H Delivery Company

    SY EX | 4 MASTER | notCOMPLETE

    SY EX | 4 MASTER | notCOMPLETE

    The R.S.S.H Delivery Company · 90問 · 5ヶ月前

    SY EX | 4 MASTER | notCOMPLETE

    SY EX | 4 MASTER | notCOMPLETE

    90問 • 5ヶ月前
    The R.S.S.H Delivery Company

    SY EX | 2 MASTER

    SY EX | 2 MASTER

    The R.S.S.H Delivery Company · 333問 · 6ヶ月前

    SY EX | 2 MASTER

    SY EX | 2 MASTER

    333問 • 6ヶ月前
    The R.S.S.H Delivery Company

    13 ) EX. 12 | COMPLETE

    13 ) EX. 12 | COMPLETE

    The R.S.S.H Delivery Company · 89問 · 6ヶ月前

    13 ) EX. 12 | COMPLETE

    13 ) EX. 12 | COMPLETE

    89問 • 6ヶ月前
    The R.S.S.H Delivery Company

    セキュリティ

    セキュリティ

    akari · 30問 · 8ヶ月前

    セキュリティ

    セキュリティ

    30問 • 8ヶ月前
    akari

    Test 10 - Computing

    Test 10 - Computing

    ユーザ名非公開 · 10問 · 10ヶ月前

    Test 10 - Computing

    Test 10 - Computing

    10問 • 10ヶ月前
    ユーザ名非公開

    linux

    linux

    nisay arbel · 79問 · 11ヶ月前

    linux

    linux

    79問 • 11ヶ月前
    nisay arbel

    問題一覧

  • 1

    What should an administrator use to import and export all items written using X.509 that are part of a chain of trust?

    Public Key Cryptography Standard (PKCS) #12

  • 2

    Which field displays the hash, or digest, of the certificate in an X.509 certificate?

    Thumbprint

  • 3

    What is an example of a symmetric algorithm?

    AES

  • 4

    Which two components involved in performing encryption are known to the party that will perform decryption before symmetric encryption is applied? Choose 2 answers.

    Cryptographic algorithm, Cryptographic key

  • 5

    Which type of cipher is ChaCha?

    Stream

  • 6

    What is the key size for RC4 with WEP?

    40 bits

  • 7

    Which symmetric encryption technique uses a 56-bit key size and a 64-bit block size?

    DES

  • 8

    Which symmetric encryption technique uses a 56-bit key size and a 64-bit block size?

    WPA

  • 9

    What is the length (in bits) of an MD5 hash output?

    128

  • 10

    How many characters are used in an LM hash password?

    14

  • 11

    A Windows credential is identified as follows: user:FDA95FBABC199D22LLD3B435B51876KK:199DDFD4EF0E9CD9KMNC6FE771IL124B8::: What is used to store this password?

    NTLM

  • 12

    Which mode encrypts each group with the same key, leaving each group independent of the others?

    ECB

  • 13

    Which mode of block encryption results in the same outcome for matching blocks of a plaintext message?

    ELECTRONIC CODE BOOK (ECB)

  • 14

    How does CBC mode encryption function?

    Uses an initialization vector (IV) to encrypt the first block, then uses the result of the encryption to encrypt the next block

  • 15

    Which encryption mode always produces the same result for the same plaintext?

    ECB

  • 16

    Which information protection method has an 80-bit key and operates on 64-bit data blocks?

    SKIPJACK

  • 17

    How many transformation rounds does AES use with a 192-bit key?

    12

  • 18

    How many transformation rounds does AES use with a 128-bit key?

    10

  • 19

    Which encryption algorithm did the National Institute of Standards and Technology (NIST) designate as a specification for the encryption of electronic information?

    AES

  • 20

    A security analyst decrypted a data set with the same key that originally encrypted the data set. Which cryptographic operation did the analyst use?

    SYMMETRIC

  • 21

    What should be used when large amounts of data need to be encrypted and decrypted for secure storage based on groupings of 128, 192, or 256 bits?

    SYMMETRIC BLOCK

  • 22

    Why should an asymmetric public key be used to encrypt a symmetric key that is being sent to one person?

    It encrypts a small amount of information, which is decrypted with the corresponding private key.

  • 23

    Which mechanism mitigates a copy-and-paste attack when using AES?

    Output feedback (OFB) loop

  • 24

    Which mechanism can be used to ensure perfect forward secrecy during key exchange when using symmetric encryption?

    ECDH

  • 25

    Which encryption component ensures that the compromise of a long-term key prevents the compromise of any previous session keys?

    FORWARD SECRECY

  • 26

    What can XOR use as a pseudorandom number to create unique ciphertext?

    Initialization vector

  • 27

    How does cipher block chaining (CBC) create randomness in a second block after encrypting the first block with an initialization vector (IV)?

    Uses the results of the IV to encrypt the next block

  • 28

    How is information about Bitcoin transactions stored?

    Distributed peer-to-peer network

  • 29

    What is one of the primary characteristics of a blockchain in the context of Bitcoin?

    Transactions between each block are chained.

  • 30

    What is the length (in bits) of the private key used to sign transactions and associated with an individual wallet in the context of Bitcoin?

    256

  • 31

    Which certificate management process involves key recovery?

    ISSUED

  • 32

    Which task does a root CA perform before publishing its own certificate?

    Signing it with its private key

  • 33

    Which algorithm is used to generate the thumbprint of a certificate?

    SHA-1

  • 34

    Large volumes of plaintext need to be encrypted, and the encryption keys need to be securely distributed. Which approach should be used for encryption and distribution?

    Encrypt by using symmetric keys and distribute by using asymmetric keys

  • 35

    What is the role of a key in asymmetric encryption and decryption?

    A public key is used for encryption, and a private key is used for decryption.

  • 36

    A security analyst is validating the integrity and authenticity of a data transaction. Which PKI component is being used?

    DIGITAL SIGNATURE

  • 37

    Which PKI component generates digital certificates?

    Certificate authority (CA)

  • 38

    What is the maximum length (in bits) of encryption keys used by the WEP protocol?

    40

  • 39

    What is a difference between WPA-Enterprise and WPA-Personal?

    Support for an authentication server

  • 40

    Which cipher is used with WEP?

    RC4

  • 41

    How does TKIP improve WPA over WEP?

    Hashes the initialization vector and secret key

  • 42

    Which default port must be open for the IPsec key exchange to be successful?

    UDP 500

  • 43

    Which protocol indicates the virtual private network (VPN) is using Authentication Header (AH)?

    51

  • 44

    Which cipher uses a grid to map letters into numeric values?

    BIFID

  • 45

    Which cipher uses a five-by-five matrix with nonrepeating characters?

    PLAYFAIR

  • 46

    What does a frequency analysis attack to break encryption involve?

    Analyzing ciphertext to identify text variation and comparing the text to standard English characters

  • 47

    Which technique should a security analyst use to determine the key length in a Vigenère cipher?

    Kasiski examination

  • 48

    Which attack tries every combination of letters, numbers, and special characters?

    BRUTE-FORCE

  • 49

    How does a dictionary attack break a cipher?

    Takes a list of the most common words and tries each entry

  • 50

    What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?

    It forwards the frame out of all ports except for the port at which the frame was received.

  • 51

    What are two features of ARP? (Choose two.)

    If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast. , If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply.