0% found this document useful (0 votes)
11 views2 pages

Notes From Practice Test

The document contains notes from a practice test covering various topics in cryptography and network security. Key points include X.509 certificate details, encryption methods like AES and RC4, and the characteristics of blockchain technology. Additionally, it discusses vulnerabilities in encryption protocols and techniques for ensuring data integrity and confidentiality.

Uploaded by

zxcvasdfqwerrewq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views2 pages

Notes From Practice Test

The document contains notes from a practice test covering various topics in cryptography and network security. Key points include X.509 certificate details, encryption methods like AES and RC4, and the characteristics of blockchain technology. Additionally, it discusses vulnerabilities in encryption protocols and techniques for ensuring data integrity and confidentiality.

Uploaded by

zxcvasdfqwerrewq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Notes from practice test

 What should an administrator use to import and export all items written using X.509 that are
part of a chain of trust?
o Public Key Cryptography Standard (PKCS) #12
 Which field displays the hash, or digest, of the certificate in an X.509 certificate?
o Thumbprint
 Which two components involved in performing encryption are known to the party that will
perform decryption before symmetric encryption is applied?
o Cryptographic algorithm and cryptographic key
 How many characters are used in an LM hash password?
o 14
 A Windows credential is identified as follows:
user:FDA95FBABC199D22LLD3B435B51876KK:199DDFD4EF0E9CD9KMNC6FE771IL124B8:::
What is used to store this password?
o HTLM
 What is the key size for RC4 with WEP?
o 40 bits
 Which wireless security standard uses a 128-bit RC4 stream cipher for encrypted
communications?
o WPA
 Which type of attacks are Diffie-Hellman methods vulnerable to?
o Man-in-the-middle
 Which mechanism mitigates a copy-and-paste attack when using AES?
o Output feedback (OFB) loop
 Which mechanism can be used to ensure perfect forward secrecy during key exchange when
using symmetric encryption?
o ECDH
 How is information about Bitcoin transactions stored?
o Distributed peer-to-peer network
 What is one of the primary characteristics of a blockchain in the context of Bitcoin?
o Adding blocks to a blockchain is computationally expensive.
 What is the length (in bits) of the private key used to sign transactions and associated with an
individual wallet in the context of Bitcoin?
o 256 bits
 What can XOR use as a pseudorandom number to create unique ciphertext?
o IV
 How does cipher block chaining (CBC) create randomness in a second block after encrypting the
first block with an initialization vector (IV)?
o Uses the results of the IV to encrypt the next block
 Which certificate management process involves key recovery?
o Issued
 Which algorithm is used to generate the thumbprint of a certificate?
o SHA-1
 A security analyst is validating the integrity and authenticity of a data transaction. Which PKI
component is being used?
o Digital signature
 What is the maximum length (in bits) of encryption keys used by the WEP protocol?
o 40 bits
 What is a difference between WPA-Enterprise and WPA-Personal?
o Support for an authentication server
 Which cipher is used with WEP?
o RC4
 How does TKIP improve WPA over WEP?
o Hashes the initialization vector and secret key
 Which protocol indicates the virtual private network (VPN) is using Authentication Header (AH)?
o 51
 Which technique should a security analyst use to determine the key length in a Vigenère cipher?
o Kasiski examination
 Which mode encrypts each group with the same key, leaving each group independent of the
others?
o ECB
 Which mode of block encryption results in the same outcome for matching blocks of a plaintext
message?
o ECB
 How does CBC mode encryption function?
o Uses an initialization vector (IV) to encrypt the first block, then uses the result of the
encryption to encrypt the next block
 Which encryption mode always produces the same result for the same plaintext?
o ECB
 How many transformation rounds does AES use with a 192-bit key?
o 12
 How many transformation rounds does AES use with a 128-bit key?
o 10
 256 bits AES is 14 rounds

You might also like