C839- Cryptography Questions and Answers
Questions in this set (60)
A business wants to use keys Private key of the root CA
issued by a trusted third party to
demonstrate to potential
customers that it is a legitimate
organization.Which key is used to
sign the certificate issued to the
business?
A business wants to use keys Public key of the company
issued by a trusted third party
to demonstrate it is a
legitimate organization to
potential customers.Which key
should the business send to
potential customers to prove
its identity?
What should an administrator use Public Key Cryptography Standard (PKCS) #12
to import and export all items
written using X.509 that are part
of a chain of trust?
Which field displays the hash, or thumbprint
digest, of the certificate in an
X.509 certificate?
, Employee B sends Employee A Employee A's private key
an encrypted message.What does
Employee A use to decrypt the
message from Employee B?
What is an example of a AES
symmetric algorithm?
Which two components Cryptographic algorithm & Cryptographic key
involved in performing
encryption are known to the
party that will perform
decryption before symmetric
encryption is applied?Choose 2
answers.
Employee A created a secret key Employee B's public key
and wants to send it to
Employee B without any
coworkers being able to
decrypt the message.Which
key needs to encrypt the
message?
Which type of cipher is ChaCha? stream
What is the key size for RC4 with 40 bits
WEP?
Which symmetric encryption DES
technique uses a 56-bit key size
and a 64-bit block size?
Which wireless security WPA
standard uses a 128-bit RC4
stream cipher for encrypted
communications?
What defines a prime number? Only has factors of itself and 1
What is 29 mod 12? 5
What happens to the hash of a The entire hash is different.
file if it is rehashed after the first
character of the file is changed?
What is the length (in bits) of an 128
MD5 hash output?
How many characters are used in 14
an LM hash password?
A Windows credential is identified NTLM
as follows:
user:FDA95FBABC199D22LLD3B43
5B51876
KK:199DDFD4EF0E9CD9KMNC6FE77
1IL124
Questions in this set (60)
A business wants to use keys Private key of the root CA
issued by a trusted third party to
demonstrate to potential
customers that it is a legitimate
organization.Which key is used to
sign the certificate issued to the
business?
A business wants to use keys Public key of the company
issued by a trusted third party
to demonstrate it is a
legitimate organization to
potential customers.Which key
should the business send to
potential customers to prove
its identity?
What should an administrator use Public Key Cryptography Standard (PKCS) #12
to import and export all items
written using X.509 that are part
of a chain of trust?
Which field displays the hash, or thumbprint
digest, of the certificate in an
X.509 certificate?
, Employee B sends Employee A Employee A's private key
an encrypted message.What does
Employee A use to decrypt the
message from Employee B?
What is an example of a AES
symmetric algorithm?
Which two components Cryptographic algorithm & Cryptographic key
involved in performing
encryption are known to the
party that will perform
decryption before symmetric
encryption is applied?Choose 2
answers.
Employee A created a secret key Employee B's public key
and wants to send it to
Employee B without any
coworkers being able to
decrypt the message.Which
key needs to encrypt the
message?
Which type of cipher is ChaCha? stream
What is the key size for RC4 with 40 bits
WEP?
Which symmetric encryption DES
technique uses a 56-bit key size
and a 64-bit block size?
Which wireless security WPA
standard uses a 128-bit RC4
stream cipher for encrypted
communications?
What defines a prime number? Only has factors of itself and 1
What is 29 mod 12? 5
What happens to the hash of a The entire hash is different.
file if it is rehashed after the first
character of the file is changed?
What is the length (in bits) of an 128
MD5 hash output?
How many characters are used in 14
an LM hash password?
A Windows credential is identified NTLM
as follows:
user:FDA95FBABC199D22LLD3B43
5B51876
KK:199DDFD4EF0E9CD9KMNC6FE77
1IL124