C839v5/D334 Additional Practice questions and
Answers
Answers Questions
, Hashing involves taking a _____ length input and producing a length output
(message digest).
variable; fixed A. fixed; fixed
B. variable; fixed
C. fixed; variable
The hash value in bits for SHA-1 is ____.
A. 128
160
B. 160
C. 256
The hash value in bits for MD4 is ____.
A. 128
128
B. 160
C. 256
IPSec___mode involves "end-to-end" encryption; i.e. data remains encrypted
from
Transport the time it leaves a sender's device to the time it arrives at the receiver's device.
A. Tunnel
B. Transport
C. Trusted
IPSec___mode involves encryption from gateway to gateway, i.e. just through
the
Tunnel public network space.
A. Tunnel
B. Transport
C. Trusted
Tunnel A security analyst on a local network using monitoring tools is
likely to only be able to read contents of traffic encrypted
using IPSec____________________________mode.
Remember, with tunnel mode,
A. Tunnel
encryption does not happen until
just before it leaves the local B. Transport
network. Traffic likely remains C. Trusted
unencrypted between the end
user device and the local
network boundary.
____is a lightweight cryptography method for signing messages (MAC). It boasts
Chaskey a
relatively undemanding hardware implementation (only ~3,333
gates required at 1MHz clock rate) making it suitable for IoT
implementation.
Chaskey has a key size of bits.
A. 256
,
Answers
Answers Questions
, Hashing involves taking a _____ length input and producing a length output
(message digest).
variable; fixed A. fixed; fixed
B. variable; fixed
C. fixed; variable
The hash value in bits for SHA-1 is ____.
A. 128
160
B. 160
C. 256
The hash value in bits for MD4 is ____.
A. 128
128
B. 160
C. 256
IPSec___mode involves "end-to-end" encryption; i.e. data remains encrypted
from
Transport the time it leaves a sender's device to the time it arrives at the receiver's device.
A. Tunnel
B. Transport
C. Trusted
IPSec___mode involves encryption from gateway to gateway, i.e. just through
the
Tunnel public network space.
A. Tunnel
B. Transport
C. Trusted
Tunnel A security analyst on a local network using monitoring tools is
likely to only be able to read contents of traffic encrypted
using IPSec____________________________mode.
Remember, with tunnel mode,
A. Tunnel
encryption does not happen until
just before it leaves the local B. Transport
network. Traffic likely remains C. Trusted
unencrypted between the end
user device and the local
network boundary.
____is a lightweight cryptography method for signing messages (MAC). It boasts
Chaskey a
relatively undemanding hardware implementation (only ~3,333
gates required at 1MHz clock rate) making it suitable for IoT
implementation.
Chaskey has a key size of bits.
A. 256
,