You Ace 2026-2027 Includes Frequently
Tested Questions With ELABORATED 100%
Correct COMPLETE SOLUTIONS
Guaranteed Pass First Attempt!!
Current Update!!
1. How many characters are used in an LM hash password?
- ANSWER 14
2. A Windows credential is identified as follows:
user:FDA95FBABC199D22LLD3B435B51876KK:199DDFD4EF0E9CD9KMNC6F
E771IL124B8::: What is used to store this password?
A. MD5
B. Bcrypt
C. SHA-512
D. NTLM
- ANSWER NTLM
3. What is a rainbow table?
A. List of matching usernames and passwords
B. Precompiled list of common words
C. List of commonly used passwords
D. Precompiled list of hash values
- ANSWER Precompiled list of hash values
- Which mode encrypts each group with the same key, leaving each
group independent of the others?
A. ECB
B. CBC
, C. CFB
D. OFB ANSWER ECB
4. Which mode of block encryption results in the same outcome for matching
blocks of a plaintext message?
A. Electronic Code Book (ECB)
B. Output feedback (OFB)
C. Cipher block chaining (CBC)
D. Cipher feedback (CFB)
- ANSWER Electronic Code Book (ECB)
5. How does CBC mode encryption function?
A. Encrypts each block with the same key, where each block is independent
of the others
B. Uses an initialization vector (IV) to encrypt the first block, then uses the
result of the encryption to encrypt the next block
C. Uses a self-synchronizing stream on the blocks, where the initialization
vector (IV) is encrypted and XORed with the data stream
D. Converts from block into stream, then uses a counter value and a nonce
to encrypt the data
- ANSWER Uses an initialization vector (IV) to encrypt the first
block, then uses the result of the encryption to encrypt the next
block
6. Which encryption mode always produces the same result for the same
plaintext?
A. CBC
B. ECB
C. CFB
D. CTR
- ANSWER ECB
, 7. Which information protection method has an 80-bit key and operates on
64-bit data blocks?
A. Skipjack
B. IDEA
C. DES
D. Twofish
- ANSWER Skipjack
8. How many transformation rounds does AES use with a 192-bit key?
A. 10
B. 12
C. 14
D. 16
- ANSWER 12
9. How many transformation rounds does AES use with a 128-bit key?
A. 10
B. 12
C. 14
D. 16
- ANSWER 10
10.Which encryption algorithm did the National Institute of Standards and
Technology (NIST) designate as a specification for the encryption of
electronic information?
A. IDEA
B. DES
C. 3DES
D. AES
- ANSWER AES