What are two hashing algorithms used with IPsec AH to guarantee authenticity? (Choose two.)

Last Updated on April 30, 2021 by Admin What are two hashing algorithms used with IPsec AH to guarantee authenticity? (Choose two.) MD5 SHA AES DH RSA Answers Explanation & Hints: The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. Two popular algorithms used to […]
Continue reading…

 

What is a benefit of having users or remote employees use a VPN to connect to the existing network rather than growing the network infrastructure?

Last Updated on April 30, 2021 by Admin What is a benefit of having users or remote employees use a VPN to connect to the existing network rather than growing the network infrastructure? security scalability cost savings compatibility Answers Explanation & Hints: A benefit of VPNs is scalability because organizations can use the Internet and […]
Continue reading…

 

Last Updated on April 30, 2021 by Admin What is the standard for a public key infrastructure to manage digital certificates? PKI NIST-SP800 x.503 x.509 Answers Explanation & Hints: The x.509 standard is for a PKI infrastructure and x.500 if for directory structures.​
Continue reading…

 

What technology allows users to verify the identity of a website and to trust code that is downloaded from the Internet?

Last Updated on April 30, 2021 by Admin What technology allows users to verify the identity of a website and to trust code that is downloaded from the Internet? asymmetric key algorithm digital signature encryption hash algorithm Answers Explanation & Hints: Digital signatures provide assurance of the authenticity and integrity of software codes. They provide […]
Continue reading…

 

What is a difference between symmetric and asymmetric encryption algorithms?

Last Updated on April 30, 2021 by Admin What is a difference between symmetric and asymmetric encryption algorithms? Symmetric algorithms are typically hundreds to thousands of times slower than asymmetric algorithms. Symmetric encryption algorithms are used to authenticate secure communications. Asymmetric encryption algorithms are used to repudiate messages. Symmetric encryption algorithms are used to encrypt […]
Continue reading…

 

Why are DES keys considered weak keys?

Last Updated on April 30, 2021 by Admin Why are DES keys considered weak keys? They are more resource intensive. DES weak keys are difficult to manage. They produce identical subkeys. DES weak keys use very long key sizes. Answers Explanation & Hints: Weak keys, whether part of an existing encryption algorithm or manually generated, […]
Continue reading…

 

One method used by Cryptanalysts to crack codes is based on the fact that some letters of the English language are used more often than others. Which term is used to describe this method?

Last Updated on April 30, 2021 by Admin One method used by Cryptanalysts to crack codes is based on the fact that some letters of the English language are used more often than others. Which term is used to describe this method? cybertext meet-in-the-middle frequency analysis known-plaintext Answers Explanation & Hints: Frequency analysis uses the […]
Continue reading…

 

Which cipher played a significant role in World War II?

Last Updated on April 30, 2021 by Admin Which cipher played a significant role in World War II? RC4 Caesar Enigma One-time pad Answers Explanation & Hints: The Enigma machine was an electromechanical encryption device that created the Enigma cipher and was developed during World War II. The device depended on the distribution of pre-shared […]
Continue reading…