Exam Prep Questions

1:

This attack requires the attacker to obtain several encrypted messages that have been encrypted using the same encryption algorithm.

  • A. Known plain-text attack
  • B. Cipher-text attack
  • C. Clear-text attack
  • D. Replay attack
2:

Which of the following best describes obtaining plain text from cipher text without a key?

  • A. Frequency analysis
  • B. Cryptanalysis
  • C. Decryption
  • D. Cracking
3:

This attack occurs when the attacker can intercept session keys and reuse them at a later date.

  • A. Known plain-text attack
  • B. Cipher-text attack
  • C. Man-in-the-middle attack
  • D. Replay attack
4:

Which of the following is a disadvantage of symmetric encryption?

  • A. Key size
  • B. Speed
  • C. Key management
  • D. Key strength
5:

Which of the following is not an example of a symmetric algorithm?

  • A. DES
  • B. RC5
  • C. AES
  • D. RSA
6:

Which of the following forms of DES is considered the most vulnerable to attack?

  • A. CBC
  • B. ECB
  • C. CFB
  • D. OFB
7:

DES uses which of the following for a key size?

  • A. 56 bit
  • B. 64 bit
  • C. 96 bit
  • D. 128 bit
8:

What implementation of Triple-DES uses the same key for the first and third iterations?

  • A. DES-EEE3
  • B. HAVAL
  • C. DES-EEE2
  • D. DES-X
9:

Which of the following algorithms is used for key distribution, not encryption or digital signatures?

  • A. El Gamal
  • B. HAVAL
  • C. Diffie-Hellman
  • D. ECC
10:

What hashing algorithm produces a 160-bit output?

  • A. MD2
  • B. MD4
  • C. SHA-1
  • D. El Gamal

Категории