Question: What is the length (in bits) of a SHA hash output?
Answer Options:
40
80
160
320
Answer: 160
Question: Which mode of encryption encrypts each block independently?
Answer Options:
CTR
CFB
ECB
OFB
Answer: ECB
Question: How does ECB mode encryption function?
Answer Options:
Converts from block to stream, then uses a counter value and a nonce to encrypt the data
Uses an initialization vector (IV) to encrypt the first block, then uses the result of the encryption to encrypt the next block
Encrypts each block with the same key, where each block is independent of the others
Uses a self-synchronizing stream on the blocks, where the initialization vector (IV) is encrypted and XORed with the data stream
Answer: Encrypts each block with the same key, where each block is independent of the others
Question: Which cryptographic operation has the fastest decryption process?
Answer Options:
Asymmetric
Hashing
Padding
Symmetric
Answer: Symmetric
Question: Which key is used to decrypt a hash in a digitally signed message?
Answer Options:
Recipient’s private key
Sender’s private key
Sender’s public key
Recipient’s public key
Answer: Sender’s public key
Question: A security analyst is using human interactions as data points to generate numbers for a program. Which type of number generator is being used?
Answer Options:
Prime
True random
Pseudorandom
Sequence
Answer: True random
Question: Which encryption algorithm uses an 80-bit key and operates on 64-bit data blocks?
Answer Options:
Twofish
Camellia
Blowfish
Skipjack
Answer: Skipjack
Question: How does a rainbow table crack stored passwords?
Answer Options:
Matches hash values back to the original plaintext
Takes a list of the most common words and tries each entry
Looks at the mathematical probability of paired values being used
Factors the prime numbers used within an RSA algorithm
Answer: Matches hash values back to the original plaintext
Question: Which attack maps hashed values and original data?
Answer Options:
Rainbow table
Brute-force
Birthday
Dictionary
Answer: Rainbow table
Question: Which mode of encryption uses an initialization vector (IV) for the first part of plaintext and then, to encrypt each subsequent part of plaintext, leverages the outcome from each preceding operation?
Answer Options:
CFB
CBC
ECB
OFB
Answer: CBC
Question: What is the correlation between a block algorithm key size and its performance and security?
Answer Options:
The key size is directly proportional to security, but performance is unaffected
As the key size increases, performance and security also increase
As the key size increases, performance decreases, and security increases
The key size is directly proportional to performance, but security is unaffected
Answer: As the key size increases, performance decreases, and security increases
Question: What does the LM hash do to passwords that are fewer than 14 characters before using the DES?
Answer Options:
Rotates characters with a Caesar cipher
Adds null characters to the end
Converts characters to lowercase
Concatenates the characters
Answer: Adds null characters to the end
Question: Which secret key algorithm is used in the Clipper chip?
Answer Options:
Blowfish
Skipjack
IDEA
DES
Answer: Skipjack
Question: Which component is used to verify that a data entity was created?
Answer Options:
TSP
AES
NTLM
HMAC
Answer: TSP
Question: Which type of encryption uses CFB mode?
Answer Options:
Stream
Hash
Salt
Block
Answer: Stream
Question: What is the maximum key size of the Blowfish cipher?
Answer Options:
128
192
256
448
Answer: 448
Question: Why should a forensic investigator create a hash on a victim’s hard drive and the bitstream copy of the hard drive?
Answer Options:
To verify that the drives are identical
To establish who created the files on the drives
To identify if someone opened the drive
To certify the information on the drive is correct
Answer: To verify that the drives are identical