You Ace 2026-2027 Includes Frequently
Tested Questions With ELABORATED 100%
Correct COMPLETE SOLUTIONS
Guaranteed Pass First Attempt!!
Current Update!!
1. Skipjack has a block size of _____bits.
A. 64
B. 80
C. 128 - ANSWER 64
2. PHOTON, SPONGENT, Lesamnta-LW, and Quark are examples of light-weight
_____.
A. hashing algorithms
B. public-key algorithms
C. symmetric block ciphers - ANSWER Light-weight hashing
algorithms
3. _____ has a block size of 64 bits, key size of 128 bits, and >17 rounds of
substitution & transposition.
A. RSA
B. DSA
C. IDEA - ANSWER IDEA
,4. _______ is a partially homomorphic crypto system that leverages prime
number characteristics, operates with a 1024-4096 bit variable key size, and
1 round.
A. RSA
B. Diffie-Hellman
C. Chaskey - ANSWER RSA
5. Blowfish and Twofish are both _____ ciphers with common key sizes of 128,
192, or 256 bits.
A. symmetric block
B. symmetric stream
C. asymmetric - ANSWER Symmetric Block
6. _____ is a symmetric block cipher that uses block sizes of 32, 64, or 128 bits
and boasts a variable key size up to 2048 bits.
A. RC2
B. RC4
C. RC5 - ANSWER RC5
7. Quark produces a hash value of _____bits.
A. 128
B. 64 or 112
C. 80 or 128 - ANSWER 64 or 112
8. The block size used with XTEA is _____ bits.
A. 56
B. 64
C. 80 - ANSWER 64
,9. The key size used with XTEA is _____ bits.
A. 128
B. 256
C. 2048 - ANSWER 128
10.Camelia is a _____.
A. Hash Algorithm
B. Symmetric block cipher
C. Symmetric key exchange algorithm - ANSWER Symmetric block
cipher
11.RC6 can best be described as a _____.
A. Lightweight Hash Algorithm
B. Symmetric Stream Cipher
C. Symmetric Block Cipher - ANSWER Symmetric Block Cipher
12.RC2 has a block size of 64 bits and variable key size up to 128 bits. What is
the minimum recommended key size to use when employing RC2?
A. 1
B. 40
C. 64 - ANSWER 40
13.The light-weight symmetric steam cipher Mickey v2 operates with a key size
of ______ bits and an initialization vector (IV) variable up to _____ bits.
A. 80; 80
B. 64; 128
C. 128; 64 - ANSWER 80; 80
, 14.RC4 is a(n) _____.
A. Symmetric block cipher
B. Symmetric stream cipher
C. Asymmetric algorithm - ANSWER Symmetric stream cipher
15.An entity seeking to obtain a digital certificate must generate and submit a
_____ request to a certificate authority to request the certificate.
A. certificate binding
B. certificate signing
C. certificate initialization - ANSWER certificate signing request (CSR)
16.ChaCha is a(n) _____.
A. Symmetric block cipher
B. Symmetric stream cipher
C. Asymmetric algorithm - ANSWER Symmetric stream cipher
17.RSA and DSA are both_____.
A. Hash algorithms
B. Symmetric stream ciphers
C. Asymmetric algorithms - ANSWER Asymmetric algorithms
18._____ provides a method for key exchange using a one-way function.
A. A hash algorithm
B. Quark
C. Diffie-Hellman - ANSWER Diffie-Hellman