Home
36.
Andy calls the help desk for assistance with sending an encrypted message to Chris. Without knowing what type of security protocol and encryption Andy and Chris are using, which of the answers here could make the following scenario true?
In order for Andy to send an encrypted message successfully to Chris, Andy is told to enter_________ on his computer; Chris needs to enter ______________ on his computer. (Choose all that apply.)
  • A.
    A public key, the companion private key
  • B.
    A private key, the companion public key
  • C.
    An asymmetric key, the same asymmetric key
  • D.
    A symmetric key, the same symmetric key
  • Answer & Explanation
  • Report
Answer : [A, D]
Explanation :
When using asymmetric encryption, the message is encrypted with the public key and decrypted with the private key. An asymmetric encryption protocol uses different keys to encrypt the data and decrypt the data. A symmetric encryption protocol uses the same key to encrypt the data and decrypt the data.
Report
Name Email  
37.
The IEEE 802.11‐2012 standard states which of the following regarding 802.11n data rates and encryption? (Choose all that apply.)
  • A.
    WEP and TKIP must not be used.
  • B.
    CCMP can only be used.
  • C.
    WEP cannot be used; however, TKIP can be used if also using 802.1X.
  • D.
    Any encryption defined by the standard is allowed.
  • Answer & Explanation
  • Report
Answer : [A, B]
Explanation :
The migration from TKIP to CCMP can be seen in the IEEE 802.11n amendment, the IEEE 802.11ac amendment, and the IEEE 802.11-2012 standard, which all state that High Throughput (HT) or Very High Throughput (VHT) data rates are not allowed to be used if WEP or TKIP is enabled.
Report
Name Email  
38.
Given that CCMP uses a MIC for data integrity to protect the frame body and portions of the MAC header, what information needs to be constructed to protect certain fields in the MAC header?
  • A.
    Nonce
  • B.
    Extended IV
  • C.
    ICV
  • D.
    AAD
  • E.
    PN
  • F.
    IV
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Additional Authentication Data (AAD) is constructed from portions of the MPDU header. This information is used for data integrity of portions of the MAC header. Receiving stations can then validate the integrity of these MAC header fields. The MIC protects the AAD information and the frame body for data integrity.
Report
Name Email  
39.
Which of the following is a FIPS encryption standard that uses a single 56‐bit symmetric key? (Choose all that apply.)
  • A.
    RC4
  • B.
    RC5
  • C.
    DES
  • D.
    3DES
  • E.
    AES
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
RC4 and RC5 were never FIPS encryption standards. 3DES is a FIPS encryption standard, but it uses three keys with an effective key size of 168 bits. AES is a FIPS encryption standard with key sizes of 128, 192, and 256 bits.
Report
Name Email  
40.
CCMP is an acronym made up of multiple components. Which of the following is an expanded version of this acronym? (Choose all that apply)
  • A.
    Counter Mode with Cipher‐Block Chaining Message Authentication Code Protocol
  • B.
    Counter Message with Cipher‐Block Chaining Mode Authentication Code Protocol
  • C.
    CTR with CBC‐MAC Protocol
  • D.
    Counter Mode with CBC‐MAC Protocol
  • E.
    None of these is accurate.
  • Answer & Explanation
  • Report
Answer : [A, C, D]
Explanation :
CCMP is the acronym for Counter Mode with Cipher-Block Chaining Message Authentication Code Protocol. Counter Mode is often represented as CTR. Cipher-Block Chaining is CBC. CBC-MAC is the acronym for Cipher-Block Chaining Message Authentication Code.
Report
Name Email