Exam Prep Questions
1: |
This attack requires the attacker to obtain several encrypted messages that have been encrypted using the same encryption algorithm.
|
2: |
Which of the following best describes obtaining plain text from cipher text without a key?
|
3: |
This attack occurs when the attacker can intercept session keys and reuse them at a later date.
|
4: |
Which of the following is a disadvantage of symmetric encryption?
|
5: |
Which of the following is not an example of a symmetric algorithm?
|
6: |
Which of the following forms of DES is considered the most vulnerable to attack?
|
7: |
DES uses which of the following for a key size?
|
8: |
What implementation of Triple-DES uses the same key for the first and third iterations?
|
9: |
Which of the following algorithms is used for key distribution, not encryption or digital signatures?
|
10: |
What hashing algorithm produces a 160-bit output?
|