100% Pass
Symmetric ✔✔Which encryption standard uses the same key to encrypt and decrypt messages?
Skipjack ✔✔Which algorithm is designated as a Type 2 product by the National Security Agency
(NSA)?
X.509 v3 ✔✔What is the most commonly used format for certificates?
Certificate revocation list (CRL) ✔✔What is referenced to determine if a certificate has been
revoked?
Sender's public key ✔✔What needs to be installed on end users' computers to allow them to trust
applications that have been digitally signed by the developer?
Public Certificate ✔✔Which type of certificate must be certified by an authority to verify it with
other participants?
It requires a unique nonce. ✔✔What is an attribute of the Rivest Cipher 4 (RC4) algorithm?
Counter (CTR) ✔✔Which mode generates the key stream with a nonce and incrementing value?
Counter (CTR) ✔✔Which mode is a stream algorithm that concatenates an incrementing value
with a nonce?
CEO's public key ✔✔Which key would an administrator use to encrypt data so only the CEO can
decrypt it?
, Digest ✔✔What is the result of a hash function?
Symmetric encryption ✔✔What is used to efficiently encrypt large files?
hvxfirgb ✔✔An administrator needs to encrypt the following word with the Atbash cipher:
security What is the correct ciphertext?
Message Digest Algorithm 5 (MD5) ✔✔Which cryptographic algorithm has a 128-bit hash size?
Collision resistance ✔✔Which characteristic makes a hashing function suitable for use in signature
schemes?
Partial-message collision ✔✔Which attribute of a hashing function makes a birthday attack
possible?
SHA-1 ✔✔Which hash algorithm produces a 160-bit output value?
Previous generated ciphertext ✔✔What does cipher block chaining (CBC) use with the key to
encrypt subsequent blocks of plaintext?
Electronic codebook (ECB) ✔✔Which mode produces the same ciphertext from two identical
plaintext blocks?
Electronic codebook (ECB) ✔✔Which encryption mode is least secure?
P = E (K,C) ✔✔What is the mathematical formula used for symmetric decryption?
Rivest-Shamir-Adleman ✔✔Which algorithm relies on factoring the product of large prime
numbers?