Month End Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

(Which technique involves spotting variations in encrypted data and plotting how the characters relate to standard English characters?)

A.

Brute force

B.

Frequency analysis

C.

Known plaintext

D.

Chosen ciphertext

(What is the length (in bits) of a SHA-1 hash output?)

A.

40

B.

80

C.

160

D.

320

(Why should an administrator choose lightweight cryptography?)

A.

The desktop is in a secure area of the building.

B.

The embedded system has limited resources.

C.

The payload requires complex rounds of encryption.

D.

The data requires minimal protection due to the sensitivity level.

(What is an attribute of RC4 when used with WEP?)

A.

40-bit key

B.

128-bit key

C.

256-bit key

D.

512-bit key

(What type of encryption uses different keys to encrypt and decrypt the message?)

A.

Symmetric

B.

Private key

C.

Secure

D.

Asymmetric

(Which attack may take the longest amount of time to achieve success?)

A.

Birthday

B.

Rainbow table

C.

Dictionary

D.

Brute-force

(Which encryption algorithm uses an 80-bit key and operates on 64-bit data blocks?)

A.

Twofish

B.

Blowfish

C.

Camellia

D.

Skipjack

(What is the correlation between the number of rounds and the key length used in the AES algorithm?)

A.

The number of rounds decreases as the key length increases.

B.

The number of rounds increases as the key length increases.

C.

The key length is the same regardless of the number of rounds.

D.

The number of rounds is the same regardless of the key length.