Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Which encryption protocol does Wi-Fi Protected Access 2 (WPA2) implement? Transport Layer Security(TLS) Encryption Advanced Encryption Standard AES Rivest Cipher 4 (RC4) encryption Data encryption

Which encryption protocol does Wi-Fi Protected Access 2 (WPA2) implement?

  • Transport Layer Security(TLS) Encryption

  • Advanced Encryption Standard AES

  • Rivest Cipher 4 (RC4) encryption

  • Data encryption standard DES


What is required to leverage Wi-Fi protected access (WPA) enterprise?

  • Directory server

  • RADIUS server

  • EAP-TLS implementation

  • EAP-TTLS implementation


Which protocol is designed to protect data in motion on home and small business networks without an authentication server?

  • Wi-fi protected Access (WPA) Personal

  • Wi-fi protected Access (WPA) Enterprise

  • Internet Key Exchange IKE

  • Diffie-Hellmann DH

An administrator needs to restrict a subordinate certificate authority CA from issuing certificates.

Where should those restrictions be stored?

  • Within the private key of the subordinate CA that issues certificates

  • Within the certificate of the parent CA of the subordinate CA

  • Within the certificate of the subordinate CA of the parent CA

  • Within the public key of the subordinate CA that issues certificates

How does a certificate authority CA guarantee the authenticity of the certificates that it issues?

  • By creating a hash and signing with its private key

  • By encrypting a serial number with its public key

  • By encrypting a serial number with its private key

  • By creating a hash and signing with its public key


Which standard describes the format for World Wide Web WWW certificates?

  • International organization for standardization (ISO) 27001

  • National institute of standard and technology NIST 800-53 Rev 4

  • Institute of electrical and electronics engineers (IEEE) 1394

  • Internet engineering task force IETF X.509v3


What makes virtual private network VPN end-to-end communications different from a local area network LAN environment?

  • Password salting

  • Hashing

  • Port blocking

  • Tunneling

Which computer process verifies the correct protocol to use to establish a layer 2 Tunneling Protocol L2TP with an internet protocol security IPsec virtual private network VPN connection?

  • Network basic input/output system (netBIOS)

  • Security Association SA

  • Secure Socket Layer SSL

  • File transfer protocol/ secure FTP/S


Which virtual private network(VPN) architecture relies on standard web ports and therefore does not require firewall changes?

  • Layer 2 tunneling protocol L2TP

  • Point-to-point tunneling protocol PPTP

  • Internet protocol Security IPsec

  • Secure sockets layer/ transport layer security (SSL/TLS) Protocol

An organization needs to secure an e-commerce website that external users must be able to trust.

Which type of certificate should this organization provide for the website?

  • Self signed root certificate

  • Trusted third party signed server certificate

  • Self signed server certificate

  • Trusted third party signed not certificate


A user encrypts a document with a key stored on the user’s laptop.

What should this user do to ensure the document can be decrypted even if the laptop is stolen or becomes corrupted?

  • Choose a 256 bit key

  • Password-protect the key stored on the laptop

  • Archive a copy of the key to secure location

  • Change the key regularly

Which cipher converts the first character of the alphabet to the last character of the alphabet?

  • Vinegere

  • atbash

  • Caesar

  • Affine

Which ciphertext would be produced if ‘candy’ were encrypted three times using the ROT13 cipher?

  • xwpzy

  • sivxy

  • pnaql

  • fdqgb


Which type of substitution cipher has been proven to be unbreakable if constructed, secured and used properly?

  • Rossignols' great cipher

  • One-time pad cipher

  • caesar cipher

Which technique does frequency analysis use?

  • Comparing ciphertext corresponding to a set of known values

  • Attempting every possible key in the range

  • Deducing the length of the keyword used in the polyalphabetic substitution cipher

  • Looking at how often letters appear against the target ciphertext

Which attack method exploits common pairs of letters in classical ciphers?

  • Frequency analysis

  • Social engineering

  • Brute force attack

  • Side channel attack

Which attack method is the most resource intensive?

  • Ciphertext-only

  • Known-plaintext

  • chosen -plaintext

  • Chosen-ciphertext

Which method of breaking a hash digest includes pre-calculating all possible values of the hash digest?

  • Brute force

  • Differential cryptanalysis

  • Linear cryptanalysis

  • Rainbow table


What are statically analyzed to determine if alteration has occurred, indicating an image contains a steganography message?

  • The least significant bit of some pixels

  • The pixels’ parity bits

  • The file header bits

  • The most significant bit of some pixels

What is the plaintext that will be hidden in a steganographic message?

  • Carrier

  • Payload

  • Channel

  • Bit

Which key is used to verify the digital signature of a message or message digest?

  • Sender's public key

  • Sender’s private key

  • Recipient’s public key

  • Recipient’s private key

Which combination is used to encrypt and digitally sign a message ?

  • Recipient’s public key to encrypt and sender’s private key to digitally sign

  • Sender’s private key to encrypt and recipient’s public key to digitally sign

  • recipient’s private key to encrypt and sender’s public key to digitally sign

  • sender’s public key to encrypt and recipient’s private key to digitally sign



Which scheme reduces the number of keys required to be secured and distributed for secure communications with multiple senders?

  • Asymmetric encryption

  • Hashing function

  • S-box

  • Symmetric encryption


Which certificate is used to decrypt a hash from a file that has been digitally signed?

  • Sender’s private key

  • Recipient’s private key

  • Sender’s public key

  • Recipient’s public key

Step by Step Solution

There are 3 Steps involved in it

Step: 1

1 Advanced Encryption Standard AES WPA2 uses AES encryption and introduces CCMP a... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Principles Of Information Security

Authors: Michael E. Whitman, Herbert J. Mattord

7th Edition

035750643X, 978-0357506431

More Books

Students also viewed these Accounting questions

Question

What is required to adversely possess land?

Answered: 1 week ago

Question

How much is 1/2 % of $10?

Answered: 1 week ago

Question

1301/2 % of $455 is what amount?

Answered: 1 week ago