C839v5/D334 Additional Practice 43 studiers today 4.9 (101 reviews) Students also studied Terms in this set (165) Western Governors UniversityD 333 Save WGU Course C838 - Managing Clou...1,037 terms WieldyStone2 Preview C839v5/D334 Algorithms Drill Teacher 51 terms ShawnD_Preview LPI Linux Essentials 010-160 81 terms superyeeter42069 Preview WGU C 293 term Wie Practice questions for this set Learn1 / 7Study using Learn A(n) _____ is a collection of precomputed hash values of actual plaintext passwords used for password cracking.128The hash value in bits for MD5 is ____.
A. 128
B. 160
C. 256
Choose an answer 1initialization vector2key pair 3rainbow table Don't know?
variable; fixedHashing involves taking a _____ length input and producing a _____ length output (message digest).
- fixed; fixed
- variable; fixed
- fixed; variable
160The hash value in bits for SHA-1 is ____.
A. 128
B. 160
C. 256
128The hash value in bits for MD4 is ____.
A. 128
B. 160
C. 256
TransportIPSec ______ mode involves "end-to-end" encryption; i.e. data remains encrypted from the time it leaves a sender's device to the time it arrives at the receiver's device.
- Tunnel
- Transport
- Trusted
- Tunnel
- Transport
- Trusted
- Tunnel
- Transport
- Trusted
TunnelIPSec ______ mode involves encryption from gateway to gateway, i.e. just through the public network space.
Tunnel Remember, with tunnel mode, encryption does not happen until just before it leaves the local network. Traffic likely remains unencrypted between the end user device and the local network boundary.A security analyst on a local network using monitoring tools is likely to only be able to read contents of traffic encrypted using IPSec ______ mode.
Chaskey_____ is a lightweight cryptography method for signing messages (MAC). It boasts a relatively undemanding hardware implementation (only ~3,333 gates required at 1MHz clock rate) making it suitable for IoT implementation.128Chaskey has a key size of _____ bits.
A. 256
B. 128
- 80
- Salt
- Ash
- Ether
saltA weakness of one-way hashing is that the same piece of plaintext will result in the same ciphertext unless _____ is applied.
40The minimum recommended key size to use with RC4 is _____ bits.
- 40
- 20
- 64
2048RC4 is a symmetric stream cipher with a variable key size up to a max of _____ bits.
A. 256
B. 2048
C. 1024
Data Encryption Standard (DES)_____ has a block size of 64 bits, key size of 56 bits, and 16 rounds of substitution & transposition.
A. DES
B. AES
C. RC4
rainbow tableA(n) _____ is a collection of precomputed hash values of actual plaintext passwords used for password cracking.
- initialization vector
- key pair
- rainbow table
- .crt
- .cer
- .der
.cer_____ is a common x.509 certificate file type that is used with both PEM and DER formats.
Triple Data Encryption Standard (3DES)_____ has a block size of 64 bits, key size of 112 bits, and 48 rounds of substitution & transposition.
A. DES
B. RSA
C. 3DES
128, 192, 256Key sizes used with the Advanced Encryption Standard (AES) include _____. _____, or
_____.
A. 10, 12, 14
B. 128, 192, 256
C. 32, 64, 80
128The Advanced Encryption Standard (AES) operates using _____ bit blocks.
A. 128
B. 192
C. 256
80Skipjack is a symmetric block cipher that uses a ______ bit key.
- 64
- 80
C. 112
128-bit key size; 64-bit IVEnocoro operates with a key size of ______ bits and an initialization vector (IV) of _____ bits.
A. 80; 80
B. 128; 64
C. 80; 64
64Skipjack has a block size of _____bits.
- 64
- 80
C. 128
Light-weight hashing algorithmsPHOTON, SPONGENT, Lesamnta-LW, and Quark are examples of light-weight
_____.
- hashing algorithms
- public-key algorithms
- symmetric block ciphers
IDEA_____ has a block size of 64 bits, key size of 128 bits, and >17 rounds of substitution & transposition.
A. RSA
B. DSA
C. IDEA
RSA_______ is a partially homomorphic crypto system that leverages prime number characteristics, operates with a 1024-4096 bit variable key size, and 1 round.
A. RSA
- Diffie-Hellman
- Chaskey
- symmetric block
- symmetric stream
- asymmetric
Symmetric BlockBlowfish and Twofish are both _____ ciphers with common key sizes of 128, 192, or 256 bits.
RC5_____ is a symmetric block cipher that uses block sizes of 32, 64, or 128 bits and boasts a variable key size up to 2048 bits.
A. RC2
B. RC4
C. RC5
64 or 112Quark produces a hash value of _____bits.
A. 128
- 64 or 112
- 80 or 128
- 56
- 64
- 80
64The block size used with XTEA is _____ bits.