Network Security FAQ: Cryptography
Q1. How many possible keys are there for an 8-bit key?
a. 8
b. 82
c. 28
d. 65,536
Q2. Which type of cipher typically acts on small units of data?
a. Block cipher
b. Stream cipher
Q3. What is the maximum key length available with 3DES?
a. 56 bits
b. 168 bits
c. 160 bits
d. 112 bits
e. 128 bits
Q4. The AES has a variable key length. True or False?
Q5. The security of the Diffie-Hellman algorithm is based on which of the following?
a. The secrecy of public values
b. The extreme amount of time required to perform exponentiation
c. The difficulty of factoring large primes
d. The secrecy of g and p values
Q6. What is the length of MD5 output (hash)?
a. 64 bits
b. 128 bits
c. 160 bits
d. 168 bits
e. 256 bits
7. What is the length of SHA-1 output (hash)?
a. 64 bits
b. 128 bits
c. 160 bits
d. 168 bits
e. 256 bits
8. What is eavesdropping?
a. An intruder gains illegitimate access by posing as an individual who actually can access secured resources.
b. An intruder “sniffs” the data transmission between two parties during communications over a public medium.
c. An intruder interrupts a dialogue and modifies the data between the two parties. The intruder would take over the entire session in an extreme case.
Q9. Which protocols can be layered on top of SSL? (Multiple answers are possible.)
a. HTTP
b. OSPF
c. FTP
d. Telnet
e. TFTP
Q10. Name the three primary security vulnerabilities for communication over a public network.