Which one of the following was an international standard for the format and information contained in a digital certificate?

You have been tasked with selecting a digital certificate standard for your company to use . Which one of the following was an international standard for the format and information contained in a digital certificate?A . CA B. X.509 C. CRL D. RFC 2298View AnswerAnswer: B Explanation: X.509 https://en.wikipedia.org/wiki/X.509 X.509...

September 22, 2022 No Comments READ MORE +

Which of the following are valid key sizes for AES (choose three)?

Which of the following are valid key sizes for AES (choose three)?A . 192 B. 56 C. 256 D. 128 E. 512 F. 64View AnswerAnswer: A,C,D Explanation: Correct answers: 128, 192, 256 https://en.wikipedia.org/wiki/Advanced_Encryption_Standard The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the...

September 22, 2022 No Comments READ MORE +

What is a variation of DES that uses a technique called Key Whitening?

What is a variation of DES that uses a technique called Key Whitening?A . Blowfish B. DESX C. 3DES D. AESView AnswerAnswer: B Explanation: DESX https://en.wikipedia.org/wiki/DES-X In cryptography, DES-X (or DESX) is a variant on the DES (Data Encryption Standard) symmetric-key block cipher intended to increase the complexity of a...

September 22, 2022 No Comments READ MORE +

Calculates the average LSB and builds a table of frequencies and Pair of Values. Performs a test on the two tables. It measures the theoretical vs. calculated population difference.

Calculates the average LSB and builds a table of frequencies and Pair of Values. Performs a test on the two tables. It measures the theoretical vs. calculated population difference.A . Certificate Authority B. Raw Quick Pair C. Chi-Square Analysis D. SP networkView AnswerAnswer: C Explanation: Chi-Square Analysis https://en.wikipedia.org/wiki/Chi-squared_test A chi-squared...

September 21, 2022 No Comments READ MORE +

A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party.

A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party.A . Digital Signature B. Hash C. Ownership stamp D. DigestView AnswerAnswer: A Explanation: Digital Signature https://en.wikipedia.org/wiki/Digital_signature A digital signature is a mathematical scheme for verifying the authenticity of digital messages...

September 20, 2022 No Comments READ MORE +

Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?

Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?A . Key distribution B. Security C. Scalability D. SpeedView AnswerAnswer: D Explanation: Speed Symmetric key systems are considerably faster than asymmetric key systems but have issues with proper key distribution, controlling keys...

September 20, 2022 No Comments READ MORE +

RFC 1321 describes what hash?

RFC 1321 describes what hash?A . RIPEMD B. GOST C. SHA1 D. MD5View AnswerAnswer: D Explanation: MD5 https://en.wikipedia.org/wiki/MD5 MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function MD4, and was specified in 1992 as RFC 132 1.

September 20, 2022 No Comments READ MORE +

Which one of the following is the most collisionresistant?

Collision resistance is an important property for any hashing algorithm. Joan wants to find a cryptographic hash that has strong collision resistance . Which one of the following is the most collisionresistant?A . SHA2 B. MD5 C. MD4 D. PIKEView AnswerAnswer: A Explanation: SHA2 https://en.wikipedia.org/wiki/Collision_resistance Collision resistance is a property...

September 19, 2022 No Comments READ MORE +

Which of the following is a protocol for exchanging keys?

Which of the following is a protocol for exchanging keys?A . DH B. EC C. AES D. RSAView AnswerAnswer: A Explanation: DH https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange DiffieCHellman key exchange is a method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols as conceived by Ralph...

September 19, 2022 No Comments READ MORE +

What size block does AES work on?

What size block does AES work on?A . 64 B. 128 C. 192 D. 256View AnswerAnswer: B Explanation: https://en.wikipedia.org/wiki/Advanced_Encryption_Standard Rijndael is a family of ciphers with different key and block sizes. For AES, NIST selected three members of the Rijndael family, each with a block size of 128 bits, but...

September 19, 2022 No Comments READ MORE +