128 *** The hash value in bits for MD5 is ____.
A. 128
B. 160
C. 256
variable; fixed *** Hashing involves taking a _____ length input and producing a _____ length output
(message digest).
A. fixed; fixed
B. variable; fixed
C. fixed; variable
160 *** The hash value in bits for SHA-1 is ____.
A. 128
B. 160
C. 256
128 *** The hash value in bits for MD4 is ____.
A. 128
B. 160
C. 256
Transport *** IPSec ______ mode involves "end-to-end" encryption; i.e. data remains encrypted from
the time it leaves a sender's device to the time it arrives at the receiver's device.
A. Tunnel
B. Transport
,C. Trusted
Tunnel *** IPSec ______ mode involves encryption from gateway to gateway, i.e. just through the
public network space.
A. Tunnel
B. Transport
C. Trusted
Tunnel
Remember, with tunnel mode, encryption does not happen until just before it leaves the local network.
Traffic likely remains unencrypted between the end user device and the local network boundary. *** A
security analyst on a local network using monitoring tools is likely to only be able to read contents of
traffic encrypted using IPSec ______ mode.
A. Tunnel
B. Transport
C. Trusted
Chaskey *** _____ is a lightweight cryptography method for signing messages (MAC). It boasts a
relatively undemanding hardware implementation (only ~3,333 gates required at 1MHz clock rate)
making it suitable for IoT implementation.
128 *** Chaskey has a key size of _____ bits.
A. 256
B. 128
C. 80
,salt *** A weakness of one-way hashing is that the same piece of plaintext will result in the same
ciphertext unless _____ is applied.
A. Salt
B. Ash
C. Ether
40 *** The minimum recommended key size to use with RC4 is _____ bits.
A. 40
B. 20
C. 64
2048 *** RC4 is a symmetric stream cipher with a variable key size up to a max of _____ bits.
A. 256
B. 2048
C. 1024
Data Encryption Standard (DES) *** _____ has a block size of 64 bits, key size of 56 bits, and 16 rounds
of substitution & transposition.
A. DES
B. AES
C. RC4
rainbow table *** A(n) _____ is a collection of precomputed hash values of actual plaintext passwords
used for password cracking.
A. initialization vector
B. key pair
C. rainbow table
, .cer *** _____ is a common x.509 certificate file type that is used with both PEM and DER formats.
A. .crt
B. .cer
C. .der
Triple Data Encryption Standard (3DES) *** _____ has a block size of 64 bits, key size of 112 bits, and 48
rounds of substitution & transposition.
A. DES
B. RSA
C. 3DES
128, 192, 256 *** Key sizes used with the Advanced Encryption Standard (AES) include _____. _____, or
_____.
A. 10, 12, 14
B. 128, 192, 256
C. 32, 64, 80
128 *** The Advanced Encryption Standard (AES) operates using _____ bit blocks.
A. 128
B. 192
C. 256
80 *** Skipjack is a symmetric block cipher that uses a ______ bit key.
A. 64
B. 80