Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What is the maximum number of different keys that can be used when encrypting with Triple DES?

A.

1

B.

2

C.

3

D.

4

Which of the following standards concerns digital certificates?

A.

X.400

B.

X.25

C.

X.509

D.

X.75

Which of the following identifies the encryption algorithm selected by NIST for the new Advanced Encryption Standard?

A.

Twofish

B.

Serpent

C.

RC6

D.

Rijndael

Which of the following BEST describes a function relying on a shared secret key that is used along with a hashing algorithm to verify the integrity of the communication content as well as the sender?

A.

Message Authentication Code - MAC

B.

PAM - Pluggable Authentication Module

C.

NAM - Negative Acknowledgement Message

D.

Digital Signature Certificate

Which of the following algorithms is a stream cipher?

A.

RC2

B.

RC4

C.

RC5

D.

RC6

What is the name of a one way transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string? Such a transformation cannot be reversed?

A.

One-way hash

B.

DES

C.

Transposition

D.

Substitution

In what type of attack does an attacker try, from several encrypted messages, to figure out the key used in the encryption process?

A.

Known-plaintext attack

B.

Ciphertext-only attack

C.

Chosen-Ciphertext attack

D.

Plaintext-only attack

How many bits is the effective length of the key of the Data Encryption Standard algorithm?

A.

168

B.

128

C.

56

D.

64

What size is an MD5 message digest (hash)?

A.

128 bits

B.

160 bits

C.

256 bits

D.

128 bytes

What is the key size of the International Data Encryption Algorithm (IDEA)?

A.

64 bits

B.

128 bits

C.

160 bits

D.

192 bits

Which of the following statements is true about data encryption as a method of protecting data?

A.

It should sometimes be used for password files

B.

It is usually easily administered

C.

It makes few demands on system resources

D.

It requires careful key management

In a SSL session between a client and a server, who is responsible for generating the master secret that will be used as a seed to generate the symmetric keys that will be used during the session?

A.

Both client and server

B.

The client's browser

C.

The web server

D.

The merchant's Certificate Server

Which of the following terms can be described as the process to conceal data into another file or media in a practice known as security through obscurity?

A.

Steganography

B.

ADS - Alternate Data Streams

C.

Encryption

D.

NTFS ADS

Which of the following can be best defined as computing techniques for inseparably embedding unobtrusive marks or labels as bits in digital data and for detecting or extracting the marks later?

A.

Steganography

B.

Digital watermarking

C.

Digital enveloping

D.

Digital signature

What is a characteristic of using the Electronic Code Book mode of DES encryption?

A.

A given block of plaintext and a given key will always produce the same ciphertext.

B.

Repetitive encryption obscures any repeated patterns that may have been present in the plaintext.

C.

Individual characters are encoded by combining output from earlier encryption routines with plaintext.

D.

The previous DES output is used as input.

What is NOT true with pre shared key authentication within IKE / IPsec protocol?

A.

Pre shared key authentication is normally based on simple passwords

B.

Needs a Public Key Infrastructure (PKI) to work

C.

IKE is used to setup Security Associations

D.

IKE builds upon the Oakley protocol and the ISAKMP protocol.

What algorithm was DES derived from?

A.

Twofish.

B.

Skipjack.

C.

Brooks-Aldeman.

D.

Lucifer.

You work in a police department forensics lab where you examine computers for evidence of crimes. Your work is vital to the success of the prosecution of criminals.

One day you receive a laptop and are part of a two man team responsible for examining it together. However, it is lunch time and after receiving the laptop you leave it on your desk and you both head out to lunch.

What critical step in forensic evidence have you forgotten?

A.

Chain of custody

B.

Locking the laptop in your desk

C.

Making a disk image for examination

D.

Cracking the admin password with chntpw

Cryptography does not concern itself with which of the following choices?

A.

Availability

B.

Integrity

C.

Confidentiality

D.

Validation

The Diffie-Hellman algorithm is primarily used to provide which of the following?

A.

Confidentiality

B.

Key Agreement

C.

Integrity

D.

Non-repudiation