- Home
- Networking
- CWSP-205
41.
Which of the following is a random numerical value that is generated one time only and is
used in cryptographic operations? (Choose all that apply.)
- A.Pseudo‐random function (PRF)
- B.One‐time password (OTP)
- C.Single sign‐on (SSO)
- D.Throw‐away variable (TV)
- E.Nonce
- Answer & Explanation
- Report
Answer : [E]
Explanation :
Explanation :
A pseudo-random function creates a pseudo-random value; however, this is simply a process to generate a number. There are no restrictions on how many times this function or value is used. A one-time password is a password that is used once; it is not necessarily random. Single-sign on is a way of providing a single login process for accessing multiple systems or resources. A throw-away variable does not exist. |
42.
Which of the following are Layer 2 encryption methods defined by the 802.11‐2012 standard?
(Choose all that apply.)
- A.WEP
- B.WPA
- C.WPA2
- D.TKIP
- E.CCMP
- F.GCMP
- Answer & Explanation
- Report
Answer : [A, D, E]
Explanation :
Explanation :
WEP, TKIP, and CCMP are defined by the IEEE 802.11-2012 standard. GCMP is an encryption method standardized in the 802.11ad-2012 amendment and is an optional method defined under the 802.11ac-2012 amendment for VHT data rates. WPA and WPA2 are certification testing standards defined by the Wi-Fi Alliance. |
43.
Which of the following encryption methods use symmetric algorithms? (Choose all that
apply.)
- A.WEP
- B.TKIP
- C.Public‐key cryptography
- D.CCMP
- Answer & Explanation
- Report
Answer : [A, B, D]
Explanation :
Explanation :
WEP, TKIP, and CCMP use symmetric algorithms. WEP and TKIP use the ARC4 algorithm. CCMP uses the AES cipher. Public-key cryptography is based on asymmetric communications. |
44.
The Rijndael algorithm was the foundation for which of the following ciphers?
- A.TKIP
- B.DES
- C.AES
- D.CCMP
- E.3DES
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
AES is based on the Rijndael algorithm. CCMP is an encryption protocol that uses the AES cipher. TKIP uses ARC4. DES and 3DES are both block ciphers unrelated to Rijndael. |
45.
A data integrity check known as Message Integrity Code (MIC) is used by which of the following?
(Choose all that apply.)
- A.WEP
- B.TKIP
- C.CCMP
- D.AES
- E.DES
- Answer & Explanation
- Report
Answer : [B, C]
Explanation :
Explanation :
A stronger data integrity check known as a Message Integrity Code (MIC), or by its common name, Michael, was introduced with TKIP to correct some of the weaknesses in WEP. CCMP also uses a MIC. AES and DES are encryption algorithms and are not concerned with message integrity. |