Question: A server is using RSA for encrypting and protecting the transmission of a session key. Which RSA key size is valid?
Answer Options:
56-bit
112-bit
128-bit
2048-bit
Answer: 2048-bit
Question: Which cryptographic operation is used to protect the communication of a derived private key during a key exchange?
Answer Options:
Hashing
Symmetric
Asymmetric
Kerberos
Answer: Asymmetric
A researcher hopes to measure a large number of individuals’ exposure to secondhand smoke throughout their lifetime and the development of lung cancer. The researchers have access to existing medical records and diagnoses, laboratory data, and prescription history.
Which study design may prove useful in helping the researcher measure the exposure the individuals had to secondhand smoke?
Answer Options:
A. Case series
B. Retrospective cohort study
C. Prospective cohort study
D. Case-control study
Correct Answer:
B. Retrospective cohort study
Question: How does public-key encryption guarantee only the recipient can decrypt an email?
Answer Options:
The hash of the email is encrypted with the sender’s private key
The payload of the email is encrypted with the recipient’s private key
The payload of the email is encrypted with the recipient’s public key
The hash of the email is encrypted with the sender’s public key
Answer: The payload of the email is encrypted with the recipient’s public key
Question: Which number generator has different results given the same input data?
Answer Options:
Prime
True random
Sequence
Pseudorandom
Answer: True random
Question: How does WEP continue to change ciphertext for duplicate information in each frame?
Answer Options:
Salt is removed from the data
Temporal Key Integrity Protocol is enabled
Cyclic redundancy check is updated
Initialization vector is incremented
Answer: Initialization vector is incremented
Question: Which cryptographic operation is computationally more process intensive?
Answer Options:
Padding
Symmetric
Hashing
Asymmetric
Answer: Asymmetric
Question: A security analyst is using AES for data encryption. Which AES key size is valid?
Answer Options:
56-bit
112-bit
128-bit
2048-bit
Answer: 128-bit
Question: Which IPsec protocol mechanism encrypts the entire packet and adds new data to the front of the packet?
Answer Options:
Security Association (SA)
Authentication Header (AH)
Internet Key Exchange (IKE)
Encapsulating Security Payload (ESP)
Answer: Encapsulating Security Payload (ESP)
Question: How often are transactions added to a blockchain?
Answer Options:
Approximately every 10 minutes
Approximately every 30 minutes
Approximately every 1 hour
Approximately every 24 hours
Answer: Approximately every 10 minutes
Question: What is the correlation between the number of blocks in a blockchain and the mining reward in Bitcoin?
Answer Options:
As the length of a blockchain increases, the mining reward decreases
The length of a blockchain increases over time, but the mining reward remains the same
The length of a blockchain remains the same, but the mining reward increases over time
As the length of a blockchain increases, the mining reward increases
Answer: As the length of a blockchain increases, the mining reward decreases
Question: What should be used when large amounts of data need to be quickly encrypted and decrypted one bit at a time?
Answer Options:
Asymmetric private key
Symmetric block
Symmetric stream
Asymmetric public key
Answer: Symmetric stream
Question: Which key do cryptographers often mistakenly use when encrypting large amounts of data?
Answer Options:
Ephemeral
Symmetric
Authentication
Public
Answer: Public
Question: An organization needs to implement a method for allowing encrypted data to be processed without providing access to the plaintext. Which encryption should be used?
Answer Options:
Asymmetric
Session
Symmetric
Homomorphic
Answer: Homomorphic
Question: An old certificate was replaced with a newer version with additional functionality. Which reason should be given in the original certificate’s revocation request?
Answer Options:
Superseded
Affiliation changed
CA compromised
Key compromised
Answer: Superseded
Question: Which encryption process sends a digital certificate with the selected cipher for encrypted communications?
Answer Options:
Server hello
Integrity check
Forward secrecy
Client hello
Answer: Server hello
Question: What stores all of its transactions in a blockchain?
Answer Options:
Exchange
SQL
Oracle
Bitcoin
Answer: Bitcoin