Question: A server is using RSA for encrypting and protecting the transmission of a session key. Which RSA key size is valid?

Answer Options:
56-bit
112-bit
128-bit
2048-bit

Answer: 2048-bit

 

Question: Which cryptographic operation is used to protect the communication of a derived private key during a key exchange?

Answer Options:
Hashing
Symmetric
Asymmetric
Kerberos

Answer: Asymmetric

A researcher hopes to measure a large number of individuals’ exposure to secondhand smoke throughout their lifetime and the development of lung cancer. The researchers have access to existing medical records and diagnoses, laboratory data, and prescription history.

Which study design may prove useful in helping the researcher measure the exposure the individuals had to secondhand smoke?

Answer Options:

A. Case series
B. Retrospective cohort study
C. Prospective cohort study
D. Case-control study

Correct Answer:

B. Retrospective cohort study

 

Question: How does public-key encryption guarantee only the recipient can decrypt an email?

Answer Options:
The hash of the email is encrypted with the sender’s private key
The payload of the email is encrypted with the recipient’s private key
The payload of the email is encrypted with the recipient’s public key
The hash of the email is encrypted with the sender’s public key

Answer: The payload of the email is encrypted with the recipient’s public key

 

Question: Which number generator has different results given the same input data?

Answer Options:
Prime
True random
Sequence
Pseudorandom

Answer: True random

 

Question: How does WEP continue to change ciphertext for duplicate information in each frame?

Answer Options:
Salt is removed from the data
Temporal Key Integrity Protocol is enabled
Cyclic redundancy check is updated
Initialization vector is incremented

Answer: Initialization vector is incremented

 

Question: Which cryptographic operation is computationally more process intensive?

Answer Options:
Padding
Symmetric
Hashing
Asymmetric

Answer: Asymmetric

 

Question: A security analyst is using AES for data encryption. Which AES key size is valid?

Answer Options:
56-bit
112-bit
128-bit
2048-bit

Answer: 128-bit

 

Question: Which IPsec protocol mechanism encrypts the entire packet and adds new data to the front of the packet?

Answer Options:
Security Association (SA)
Authentication Header (AH)
Internet Key Exchange (IKE)
Encapsulating Security Payload (ESP)

Answer: Encapsulating Security Payload (ESP)

 

Question: How often are transactions added to a blockchain?

Answer Options:
Approximately every 10 minutes
Approximately every 30 minutes
Approximately every 1 hour
Approximately every 24 hours

Answer: Approximately every 10 minutes

 

Question: What is the correlation between the number of blocks in a blockchain and the mining reward in Bitcoin?

Answer Options:
As the length of a blockchain increases, the mining reward decreases
The length of a blockchain increases over time, but the mining reward remains the same
The length of a blockchain remains the same, but the mining reward increases over time
As the length of a blockchain increases, the mining reward increases

Answer: As the length of a blockchain increases, the mining reward decreases

 

Question: What should be used when large amounts of data need to be quickly encrypted and decrypted one bit at a time?

Answer Options:
Asymmetric private key
Symmetric block
Symmetric stream
Asymmetric public key

Answer: Symmetric stream

 

Question: Which key do cryptographers often mistakenly use when encrypting large amounts of data?

Answer Options:
Ephemeral
Symmetric
Authentication
Public

Answer: Public

 

Question: An organization needs to implement a method for allowing encrypted data to be processed without providing access to the plaintext. Which encryption should be used?

Answer Options:
Asymmetric
Session
Symmetric
Homomorphic

Answer: Homomorphic

 

Question: An old certificate was replaced with a newer version with additional functionality. Which reason should be given in the original certificate’s revocation request?

Answer Options:
Superseded
Affiliation changed
CA compromised
Key compromised

Answer: Superseded

 

Question: Which encryption process sends a digital certificate with the selected cipher for encrypted communications?

Answer Options:
Server hello
Integrity check
Forward secrecy
Client hello

Answer: Server hello

 

Question: What stores all of its transactions in a blockchain?

Answer Options:
Exchange
SQL
Oracle
Bitcoin

Answer: Bitcoin