Month End Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

(How does Electronic Codebook (ECB) mode encryption function?)

A.

Converts from block to stream, then uses a counter value and a nonce to encrypt the data

B.

Uses a self-synchronizing stream on the blocks, where the IV is encrypted and XORed with the data stream

C.

Uses an IV to encrypt the first block, then uses the result to encrypt the next block

D.

Encrypts each block with the same key, where each block is independent of the others

(What is the value of 51 mod 11?)

A.

04

B.

05

C.

07

D.

11

(An administrator has configured a Virtual Private Network (VPN) connection utilizing IPsec transport mode with Encapsulating Security Payload (ESP) between a server in the corporate office and a client computer in the remote office. In which situation can the packet content be inspected?)

A.

On devices at headquarters and offsite before being sent and after being received

B.

In the headquarters’ and offsite location’s networks after the data has been sent

C.

Only in the offsite location’s network while data is in transit

D.

Only in the headquarters’ network while data is in transit

(How are limits managed for the number of bitcoins that can be created and stored in a blockchain?)

A.

Rewards for mining reduce over time

B.

The total number of participants has been set

C.

A maximum has been established per country

D.

Each person has a maximum number

(What makes the RC4 cipher unique compared to RC5 and RC6?)

A.

Stream

B.

Asymmetric

C.

Symmetric

D.

Block

(Why should a forensic investigator create a hash of a victim’s hard drive and of the bitstream copy of the hard drive?)

A.

To identify if someone opened the drive

B.

To certify the information on the drive is correct

C.

To establish who created the files on the drives

D.

To verify that the drives are identical

(Which type of exploit involves looking for different inputs that generate the same hash?)

A.

Birthday attack

B.

Linear cryptanalysis

C.

Algebraic attack

D.

Differential cryptanalysis

(What are the roles of keys when using digital signatures?)

A.

A private key is used for both signing and signature validation.

B.

A private key is used for signing, and a public key is used for signature validation.

C.

A public key is used for both signing and signature validation.

D.

A public key is used for signing, and a private key is used for signature validation.

(What is an alternative to using a Certificate Revocation List (CRL) with certificates?)

A.

Privacy Enhanced Mail (PEM)

B.

Online Certificate Status Protocol (OCSP)

C.

Root Certificate Authority (CA)

D.

Policy Certificate Authority (CA)

(Which wireless security standard uses an authentication server with 802.1X and EAP?)

A.

WPA-PSK

B.

WEP

C.

WPA-Enterprise

D.

TKIP