What does this provide?

In a Feistel cipher, the two halves of the block are swapped in each round . What does this provide?A . Diffusion B. Confusion C. Avalanche D. SubstitutionView AnswerAnswer: B Explanation: Confusion https://en.wikipedia.org/wiki/Confusion_and_diffusion#Definition Confusion means that each binary digit (bit) of the ciphertext should depend on several parts of the...

September 24, 2022 No Comments READ MORE +

Which one of the following is an algorithm that uses variable length key from 1 to 256 bytes, which constitutes a state table that is used for subsequent generation of pseudorandom bytes and then a pseudorandom string of bits, which is XORed with the plaintext to produce the ciphertext?

Which one of the following is an algorithm that uses variable length key from 1 to 256 bytes, which constitutes a state table that is used for subsequent generation of pseudorandom bytes and then a pseudorandom string of bits, which is XORed with the plaintext to produce the ciphertext?A ....

September 23, 2022 No Comments READ MORE +

In 1977 researchers and MIT described what asymmetric algorithm?

In 1977 researchers and MIT described what asymmetric algorithm?A . DH B. RSA C. AES D. ECView AnswerAnswer: B Explanation: RSA https://en.wikipedia.org/wiki/RSA_(cryptosystem) RSA (RivestCShamirCAdleman) is a public-key cryptosystem that is widely used for secure data transmission. It is also one of the oldest. The acronym RSA comes from the surnames...

September 23, 2022 No Comments READ MORE +

Attempting to crack encryption by simply trying as many randomly generated keys as possible is referred to as what?

Frank is trying to break into an encrypted fileā€¦ He is attempting all the possible keys that could be used for this algorithm. Attempting to crack encryption by simply trying as many randomly generated keys as possible is referred to as what?A . Rainbow table B. Frequency analysis C. Brute...

September 23, 2022 No Comments READ MORE +

WPA2 uses AES for wireless data encryption at which of the following encryption levels?

WPA2 uses AES for wireless data encryption at which of the following encryption levels?A . 128 bit and CRC B. 128 bi and TKIP C. 128 bit and CCMP D. 64 bit and CCMPView AnswerAnswer: C Explanation: 128 bit and CCMP Counter Mode with Cipher Block Chaining Message Authentication Code...

September 23, 2022 No Comments READ MORE +

What are the two modes of IPSec?

John is responsible for VPNs at his company. He is using IPSec because it has two different modes. He can choose the mode appropriate for a given situation . What are the two modes of IPSec? (Choose two)A . Encrypt mode B. Transport mode C. Tunnel mode D. Decrypt modeView...

September 23, 2022 No Comments READ MORE +

A simple algorithm that will take the initial key and from that generate a slightly different key each round.

A simple algorithm that will take the initial key and from that generate a slightly different key each round.A . Key Schedule B. Feistel Network C. SHA-2 D. Diffie-HelmanView AnswerAnswer: A Explanation: Key Schedule https://en.wikipedia.org/wiki/Key_schedule In cryptography, the so-called product ciphers are a certain kind of cipher, where the (de-)ciphering...

September 22, 2022 No Comments READ MORE +

Which of the following is the standard for digital certificates?

Which of the following is the standard for digital certificates?A . RFC 2298 B. X.509 C. CRL D. CAView AnswerAnswer: B Explanation: X.509 https://en.wikipedia.org/wiki/X.509 X.509 is a standard defining the format of public key certificates. X.509 certificates are used in many Internet protocols, including TLS/SSL, which is the basis for...

September 22, 2022 No Comments READ MORE +

Juanita is attempting to hide some text into a jpeg file. Hiding messages inside another medium is referred to as which one of the following?

Juanita is attempting to hide some text into a jpeg file. Hiding messages inside another medium is referred to as which one of the following?A . Cryptography B. Steganalysis C. Cryptology D. SteganographyView AnswerAnswer: D Explanation: Steganography https://en.wikipedia.org/wiki/Steganography Steganography is the practice of concealing a file, message, image, or video...

September 22, 2022 No Comments READ MORE +

Which one of the following is a component of the PKI?

Which one of the following is a component of the PKI?A . CA B. TGS C. OCSP D. TGTView AnswerAnswer: A Explanation: CA https://en.wikipedia.org/wiki/Certificate_authority Certificate authority or certification authority (CA) is an entity that issues digital certificates. A digital certificate certifies the ownership of a public key by the named...

September 22, 2022 No Comments READ MORE +