Home
41.
Which of the following is a random numerical value that is generated one time only and is used in cryptographic operations? (Choose all that apply.)
  • A.
    Pseudo‐random function (PRF)
  • B.
    One‐time password (OTP)
  • C.
    Single sign‐on (SSO)
  • D.
    Throw‐away variable (TV)
  • E.
    Nonce
  • Answer & Explanation
  • Report
Answer : [E]
Explanation :
A pseudo-random function creates a pseudo-random value; however, this is simply a process to generate a number. There are no restrictions on how many times this function or value is used. A one-time password is a password that is used once; it is not necessarily random. Single-sign on is a way of providing a single login process for accessing multiple systems or resources. A throw-away variable does not exist.
Report
Name Email  
42.
Which of the following are Layer 2 encryption methods defined by the 802.11‐2012 standard? (Choose all that apply.)
  • A.
    WEP
  • B.
    WPA
  • C.
    WPA2
  • D.
    TKIP
  • E.
    CCMP
  • F.
    GCMP
  • Answer & Explanation
  • Report
Answer : [A, D, E]
Explanation :
WEP, TKIP, and CCMP are defined by the IEEE 802.11-2012 standard. GCMP is an encryption method standardized in the 802.11ad-2012 amendment and is an optional method defined under the 802.11ac-2012 amendment for VHT data rates. WPA and WPA2 are certification testing standards defined by the Wi-Fi Alliance.
Report
Name Email  
43.
Which of the following encryption methods use symmetric algorithms? (Choose all that apply.)
  • A.
    WEP
  • B.
    TKIP
  • C.
    Public‐key cryptography
  • D.
    CCMP
  • Answer & Explanation
  • Report
Answer : [A, B, D]
Explanation :
WEP, TKIP, and CCMP use symmetric algorithms. WEP and TKIP use the ARC4 algorithm. CCMP uses the AES cipher. Public-key cryptography is based on asymmetric communications.
Report
Name Email  
44.
The Rijndael algorithm was the foundation for which of the following ciphers?
  • A.
    TKIP
  • B.
    DES
  • C.
    AES
  • D.
    CCMP
  • E.
    3DES
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
AES is based on the Rijndael algorithm. CCMP is an encryption protocol that uses the AES cipher. TKIP uses ARC4. DES and 3DES are both block ciphers unrelated to Rijndael.
Report
Name Email  
45.
A data integrity check known as Message Integrity Code (MIC) is used by which of the following? (Choose all that apply.)
  • A.
    WEP
  • B.
    TKIP
  • C.
    CCMP
  • D.
    AES
  • E.
    DES
  • Answer & Explanation
  • Report
Answer : [B, C]
Explanation :
A stronger data integrity check known as a Message Integrity Code (MIC), or by its common name, Michael, was introduced with TKIP to correct some of the weaknesses in WEP. CCMP also uses a MIC. AES and DES are encryption algorithms and are not concerned with message integrity.
Report
Name Email