Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

What does Output feedback (OFB) do:

A.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

B.

The cipher text from the current round is XORed with the plaintext from the previous round

C.

A block cipher is converted into a stream cipher by generating a keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext

D.

The cipher text from the current round is XORed with the plaintext for the next round

Full Access
Question # 5

Message hidden in unrelated text. Sender and receiver have pre-arranged to use a pattern to remove certain letters from the message which leaves only the true message behind.

A.

Caesar Cipher

B.

Null Ciphers

C.

Vigenere Cipher

D.

Playfair Cipher

Full Access
Question # 6

Which of the following asymmetric algorithms is described by U.S. Patent 5,231,668 and FIPS 186

A.

AES

B.

RC4

C.

DSA

D.

RSA

Full Access
Question # 7

The ATBASH cipher is best described as what type of cipher?

A.

Asymmetric

B.

Symmetric

C.

Substitution

D.

Transposition

Full Access
Question # 8

A _____ is a function is not reversible.

A.

Stream cipher

B.

Asymmetric cipher

C.

Hash

D.

Block Cipher

Full Access
Question # 9

Which of the following would be the fastest.

A.

EC

B.

DH

C.

RSA

D.

AES

Full Access
Question # 10

Juanita has been assigned the task of selecting email encryption for the staff of the insurance company she works for. The various employees often use diverse email clients. Which of the following methods is available as an add-in for most email clients?

A.

Caesar cipher

B.

RSA

C.

PGP

D.

DES

Full Access
Question # 11

Which one of the following is an example of a symmetric key algorithm?

A.

ECC

B.

Diffie-Hellman

C.

RSA

D.

Rijndael

Full Access
Question # 12

A symmetric Stream Cipher published by the German engineering firm Seimans in 1993. A software based stream cipher that uses a Lagged Fibonacci generator along with concepts borrowed from shrinking generator ciphers.

A.

DESX

B.

FISH

C.

Twofish

D.

IDEA

Full Access
Question # 13

This is a proprietary version of PAP. Encrypts username and password as it is sent across network.

A.

PPTP VPN

B.

S-PAP

C.

Kerberos

D.

WPA2

Full Access
Question # 14

A technique used to increase the security of block ciphers. It consists of steps that combine the data with portions of the key (most commonly using a simple XOR) before the first round and after the last round of encryption.

A.

Whitening

B.

Key Exchange

C.

Key Schedule

D.

Key Clustering

Full Access
Question # 15

If you wished to see a list of revoked certificates from a CA, where would you look?

A.

RA

B.

RFC

C.

CRL

D.

CA

Full Access
Question # 16

Bruce Schneier is a well-known and highly respected cryptographer. He has developed several pseudo random number generators as well as worked on teams developing symmetric ciphers. Which one of the following is a symmetric block cipher designed in 1993 by Bruce Schneier team that is unpatented?

A.

Pegasus

B.

Blowfish

C.

SHA1

D.

AES

Full Access
Question # 17

A cryptographic hash function which uses a Merkle tree-like structure to allow for immense parallel computation of hashes for very long inputs. Authors claim a performance of 28 cycles per byte for MD6-256 on an Intel Core 2 Duo and provable resistance against differential cryptanalysis.

A.

TIGER

B.

GOST

C.

MD5

D.

MD6

Full Access
Question # 18

Which of the following encryption algorithms relies on the inability to factor large prime numbers?

A.

RSA

B.

MQV

C.

EC

D.

AES

Full Access
Question # 19

What is a variation of DES that uses a technique called Key Whitening?

A.

Blowfish

B.

DESX

C.

3DES

D.

AES

Full Access
Question # 20

What does the OCSP protocol provide?

A.

Revoked certificates

B.

Hashing

C.

VPN connectivity

D.

Encryption

Full Access
Question # 21

You are explaining the details of the AES algorithm to cryptography students. You are discussing the derivation of the round keys from the shared symmetric key. The portion of AES where round keys are derived from the cipher key using Rijndael's key schedule is called what?

A.

The key expansion phase

B.

The round key phase

C.

The bit shifting phase

D.

The initial round

Full Access
Question # 22

In relationship to hashing, the term _____refers to random bits that are used as one of the inputs to the hash. Essentially the ______ is intermixed with the message that is to be hashed

A.

Vector

B.

Salt

C.

Stream

D.

IV

Full Access
Question # 23

Bob’s password is hashed, and so is John’s. Even though they used different passwords, the hash is the same. What is this called?

A.

A collision

B.

A mistake

C.

Convergence

D.

Transposition

Full Access
Question # 24

The reverse process from encoding - converting the encoded message back into its plaintext format.

A.

Substitution

B.

Whitening

C.

Encoding

D.

Decoding

Full Access
Question # 25

What is the largest key size that AES can use?

A.

256

B.

56

C.

512

D.

128

Full Access
Question # 26

Which of the following would be the weakest encryption algorithm?

A.

DES

B.

AES

C.

RSA

D.

EC

Full Access
Question # 27

Manipulating individuals so that they will divulge confidential information, rather than by breaking in or using technical cracking techniques.

A.

Linear cryptanalysis

B.

Replay attack

C.

Side-channel attack

D.

Social engineering attack

Full Access
Question # 28

Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. Changes to one character in the plaintext affect multiple characters in the ciphertext. What is this referred to?

A.

Avalanche

B.

Confusion

C.

Scrambling

D.

Diffusion

Full Access
Question # 29

The most widely used asymmetric encryption algorithm is what?

A.

Vigenere

B.

Caesar Cipher

C.

RSA

D.

DES

Full Access
Question # 30

A digital document that contains a public key and some information to allow your system to verify where that key came from. Used for web servers, Cisco Secure phones, E-Commerce.

A.

Registration Authority

B.

Payload

C.

OCSP

D.

Digital Certificate

Full Access
Question # 31

The art and science of writing hidden messages so that no one suspects the existence of the message, a type of security through obscurity. Message can be hidden in picture or audio file for example. Uses least significant bits in a file to store data.

A.

Steganography

B.

Cryptosystem

C.

Avalanche effect

D.

Key Schedule

Full Access
Question # 32

Which one of the following is a symmetric key system using 64-bit blocks?

A.

DES

B.

PGP

C.

DSA

D.

RSA

Full Access
Question # 33

Which one of the following wireless standards uses the Advanced Encryption Standard (AES) using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?

A.

WEP

B.

WEP2

C.

WPA

D.

WPA2

Full Access
Question # 34

Which service in a PKI will vouch for the identity of an individual or company?

A.

CA

B.

CR

C.

KDC

D.

CBC

Full Access
Question # 35

Which one of the following attempts to hide data in plain view?

A.

Cryptography

B.

Substitution

C.

Steganography

D.

Asymmetric cryptography

Full Access
Question # 36

A list of certificates that have been revoked.

A.

CA

B.

CRL

C.

PCBC

D.

OCSP

Full Access
Question # 37

Which of the following is the successor of SSL?

A.

GRE

B.

RSA

C.

IPSec

D.

TLS

Full Access
Question # 38

3DES can best be classified as which one of the following?

A.

Digital signature

B.

Symmetric algorithm

C.

Asymmetric algorithm

D.

Hashing algorithm

Full Access
Question # 39

Represents the total number of possible values of keys in a cryptographic algorithm or other security measure, such as a password.

A.

Key Schedule

B.

Key Clustering

C.

Key Space

D.

Key Exchange

Full Access
Question # 40

What is a salt?

A.

Key whitening

B.

Random bits intermixed with a symmetric cipher to increase randomness and make it more secure

C.

Key rotation

D.

Random bits intermixed with a hash to increase randomness and reduce collisions

Full Access
Question # 41

The most common way steganography is accomplished is via which one of the following?

A.

rsb

B.

Isb

C.

msb

D.

asb

Full Access
Question # 42

A real time protocol for verifying certificates (and a newer method than CRL).

A.

Online Certificate Status Protocol (OCSP)

B.

Server-based Certificate Validation Protocol (SCVP)

C.

Public Key Infrastructure (PKI)

D.

Registration Authority (RA)

Full Access
Question # 43

A _____ is a function that takes a variable-size input m and returns a fixed-size string.

A.

Feistel

B.

Asymmetric cipher

C.

Symmetric cipher

D.

Hash

Full Access
Question # 44

Which one of the following is an authentication method that sends the username and password in cleartext?

A.

PAP

B.

CHAP

C.

Kerberos

D.

SPAP

Full Access
Question # 45

What is the name of the attack where the attacker obtains the ciphertexts corresponding to a set of plaintexts of his own choosing?

A.

Chosen plaintext

B.

Differential cryptanalysis

C.

Known-plaintext attack

D.

Kasiski examination

Full Access
Question # 46

Which of the following is an asymmetric cipher?

A.

RSA

B.

AES

C.

DES

D.

RC4

Full Access
Question # 47

Which one of the following are characteristics of a hash function? (Choose two)

A.

Requires a key

B.

One-way

C.

Fixed length output

D.

Symmetric

E.

Fast

Full Access
Question # 48

A type of frequency analysis used to attack polyalphabetic substitution ciphers. It's used to try to discover patterns and use that information to decrypt the cipher.

A.

Kasiski Method

B.

Birthday Attack

C.

Information Deduction

D.

Integral Cryptanalysis

Full Access
Question # 49

The next number is derived from adding together the prior two numbers (1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89).

A.

Odd numbers

B.

Fibonacci Sequence

C.

Fermat pseudoprime

D.

Prime numbers

Full Access
Question # 50

What is a TGS?

A.

The server that escrows keys

B.

A protocol for encryption

C.

A protocol for key exchange

D.

The server that grants Kerberos tickets

Full Access
Question # 51

You are explaining basic mathematics to beginning cryptography students. You are covering the basic math used in RSA. A prime number is defined as

A.

Odd numbers with no divisors

B.

Odd numbers

C.

Any number only divisible by odd numbers

D.

Any number only divisible by one and itself

Full Access
Question # 52

What is the basis for the difficulty in breaking RSA?

A.

Hashing

B.

The birthday paradox

C.

Equations that describe an elliptic curve

D.

Factoring numbers

Full Access
Question # 53

Which of the following was a multi alphabet cipher widely used from the 16th century to the early 20th century?

A.

Atbash

B.

Caesar

C.

Scytale

D.

Vigenere

Full Access
Question # 54

_____ uses at least two different shifts, changing the shift with different letters in the plain text.

A.

Caesar cipher

B.

multi-alphabet encryption

C.

Scytale

D.

Atbash

Full Access
Question # 55

John is going to use RSA to encrypt a message to Joan. What key should he use?

A.

A random key

B.

Joan’s public key

C.

A shared key

D.

Joan’s private key

Full Access
Question # 56

What is the basis for the FISH algorithm?

A.

The Lagged Fibonacci generator

B.

Prime number theory

C.

Equations that describe an ellipse

D.

The difficulty in factoring numbers

Full Access
Question # 57

Which of the following is generally true about key sizes?

A.

Larger key sizes increase security

B.

Key size is irrelevant to security

C.

Key sizes must be more than 256 bits to be secure

D.

Smaller key sizes increase security

Full Access
Question # 58

With Electronic codebook (ECB) what happens:

A.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

B.

The cipher text from the current round is XORed with the plaintext from the previous round

C.

The block cipher is turned into a stream cipher

D.

The cipher text from the current round is XORed with the plaintext for the next round

Full Access
Question # 59

John is responsible for VPNs at his company. He is using IPSec because it has two different modes. He can choose the mode appropriate for a given situation. What are the two modes of IPSec? (Choose two)

A.

Encrypt mode

B.

Transport mode

C.

Tunnel mode

D.

Decrypt mode

Full Access
Question # 60

A symmetric block cipher designed in 1993 by Bruce Schneier. Was intended as a replacement for DES. Like DES it is a 16 round Feistel working on 64bit blocks. Can have bit sizes 32bits to 448bits.

A.

Skipjack

B.

Blowfish

C.

MD5

D.

Serpent

Full Access
Question # 61

Which analysis type is based on the statistics of the numbers of unique colors and close-color pairs in a 24-bit image, a method that analyzes the pairs of colors created by LSB embedding?

A.

Differential Analysis

B.

Discrete Cosine Transform

C.

Raw Quick Pair

D.

Chi squared analysis

Full Access