Exam Prep Questions
| 1: | 
			 This attack requires the attacker to obtain several encrypted messages that have been encrypted using the same encryption algorithm. 
 
 
 
 
  | 
		
| 2: | 
			 Which of the following best describes obtaining plain text from cipher text without a key? 
 
 
 
 
  | 
		
| 3: | 
			 This attack occurs when the attacker can intercept session keys and reuse them at a later date. 
 
 
 
 
  | 
		
| 4: | 
			 Which of the following is a disadvantage of symmetric encryption? 
 
 
 
 
  | 
		
| 5: | 
			 Which of the following is not an example of a symmetric algorithm? 
 
 
 
 
  | 
		
| 6: | 
			 Which of the following forms of DES is considered the most vulnerable to attack? 
 
 
 
 
  | 
		
| 7: | 
			 DES uses which of the following for a key size? 
 
 
 
 
  | 
		
| 8: | 
			 What implementation of Triple-DES uses the same key for the first and third iterations? 
 
 
 
 
  | 
		
| 9: | 
			 Which of the following algorithms is used for key distribution, not encryption or digital signatures? 
 
 
 
 
  | 
		
| 10: | 
			 What hashing algorithm produces a 160-bit output? 
 
 
 
 
  |