Question
Which encryption protocol does Wi-Fi Protected Access 2 (WPA2) implement? Transport Layer Security(TLS) Encryption Advanced Encryption Standard AES Rivest Cipher 4 (RC4) encryption Data encryption
Which encryption protocol does Wi-Fi Protected Access 2 (WPA2) implement?
Transport Layer Security(TLS) Encryption
Advanced Encryption Standard AES
Rivest Cipher 4 (RC4) encryption
Data encryption standard DES
What is required to leverage Wi-Fi protected access (WPA) enterprise?
Directory server
RADIUS server
EAP-TLS implementation
EAP-TTLS implementation
Which protocol is designed to protect data in motion on home and small business networks without an authentication server?
Wi-fi protected Access (WPA) Personal
Wi-fi protected Access (WPA) Enterprise
Internet Key Exchange IKE
Diffie-Hellmann DH
An administrator needs to restrict a subordinate certificate authority CA from issuing certificates.
Where should those restrictions be stored?
Within the private key of the subordinate CA that issues certificates
Within the certificate of the parent CA of the subordinate CA
Within the certificate of the subordinate CA of the parent CA
Within the public key of the subordinate CA that issues certificates
How does a certificate authority CA guarantee the authenticity of the certificates that it issues?
By creating a hash and signing with its private key
By encrypting a serial number with its public key
By encrypting a serial number with its private key
By creating a hash and signing with its public key
Which standard describes the format for World Wide Web WWW certificates?
International organization for standardization (ISO) 27001
National institute of standard and technology NIST 800-53 Rev 4
Institute of electrical and electronics engineers (IEEE) 1394
Internet engineering task force IETF X.509v3
What makes virtual private network VPN end-to-end communications different from a local area network LAN environment?
Password salting
Hashing
Port blocking
Tunneling
Which computer process verifies the correct protocol to use to establish a layer 2 Tunneling Protocol L2TP with an internet protocol security IPsec virtual private network VPN connection?
Network basic input/output system (netBIOS)
Security Association SA
Secure Socket Layer SSL
File transfer protocol/ secure FTP/S
Which virtual private network(VPN) architecture relies on standard web ports and therefore does not require firewall changes?
Layer 2 tunneling protocol L2TP
Point-to-point tunneling protocol PPTP
Internet protocol Security IPsec
Secure sockets layer/ transport layer security (SSL/TLS) Protocol
An organization needs to secure an e-commerce website that external users must be able to trust.
Which type of certificate should this organization provide for the website?
Self signed root certificate
Trusted third party signed server certificate
Self signed server certificate
Trusted third party signed not certificate
A user encrypts a document with a key stored on the user’s laptop.
What should this user do to ensure the document can be decrypted even if the laptop is stolen or becomes corrupted?
Choose a 256 bit key
Password-protect the key stored on the laptop
Archive a copy of the key to secure location
Change the key regularly
Which cipher converts the first character of the alphabet to the last character of the alphabet?
Vinegere
atbash
Caesar
Affine
Which ciphertext would be produced if ‘candy’ were encrypted three times using the ROT13 cipher?
xwpzy
sivxy
pnaql
fdqgb
Which type of substitution cipher has been proven to be unbreakable if constructed, secured and used properly?
Rossignols' great cipher
One-time pad cipher
caesar cipher
Which technique does frequency analysis use?
Comparing ciphertext corresponding to a set of known values
Attempting every possible key in the range
Deducing the length of the keyword used in the polyalphabetic substitution cipher
Looking at how often letters appear against the target ciphertext
Which attack method exploits common pairs of letters in classical ciphers?
Frequency analysis
Social engineering
Brute force attack
Side channel attack
Which attack method is the most resource intensive?
Ciphertext-only
Known-plaintext
chosen -plaintext
Chosen-ciphertext
Which method of breaking a hash digest includes pre-calculating all possible values of the hash digest?
Brute force
Differential cryptanalysis
Linear cryptanalysis
Rainbow table
What are statically analyzed to determine if alteration has occurred, indicating an image contains a steganography message?
The least significant bit of some pixels
The pixels’ parity bits
The file header bits
The most significant bit of some pixels
What is the plaintext that will be hidden in a steganographic message?
Carrier
Payload
Channel
Bit
Which key is used to verify the digital signature of a message or message digest?
Sender's public key
Sender’s private key
Recipient’s public key
Recipient’s private key
Which combination is used to encrypt and digitally sign a message ?
Recipient’s public key to encrypt and sender’s private key to digitally sign
Sender’s private key to encrypt and recipient’s public key to digitally sign
recipient’s private key to encrypt and sender’s public key to digitally sign
sender’s public key to encrypt and recipient’s private key to digitally sign
Which scheme reduces the number of keys required to be secured and distributed for secure communications with multiple senders?
Asymmetric encryption
Hashing function
S-box
Symmetric encryption
Which certificate is used to decrypt a hash from a file that has been digitally signed?
Sender’s private key
Recipient’s private key
Sender’s public key
Recipient’s public key
Step by Step Solution
There are 3 Steps involved in it
Step: 1
1 Advanced Encryption Standard AES WPA2 uses AES encryption and introduces CCMP a...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started