(What is used to randomize the initial value when generating Initialization Vectors (IVs)?)
(What is the maximum key size (in bits) supported by AES?)
(Which type of network were VPN connections originally designed to tunnel through?)
(What is the value of 23 mod 6?)
(What makes the RC4 cipher unique compared to RC5 and RC6?)
(Which authentication method allows a customer to authenticate to a web service?)
(A security analyst is using 3DES for data encryption. Which 3DES key size is valid?)
(A security engineer is implementing device authentication as a form of two-factor authentication in a Public Key Infrastructure (PKI) environment. What should be used as a second form of authentication?)
(Which component is used to verify the integrity of a message?)
(Which mechanism can be applied to protect the integrity of plaintext when using AES?)
(Which symmetric encryption technique uses a 256-bit key size and a 128-bit block size?)
(What type of encryption uses different keys to encrypt and decrypt the message?)
(A Linux user password is identified as follows:
$2a$08$AbCh0RCM8p8FGaYvRLI0H.Kng54gcnWCOQYIhas708UEZRQQjGBh4
Which hash algorithm should be used to salt this password?)
(How are limits managed for the number of bitcoins that can be created and stored in a blockchain?)
(Which mechanism implemented in WPA-Enterprise guards against bit-flipping exploits?)
(Which attack may take the longest amount of time to achieve success?)
(Which encryption algorithm uses an 80-bit key and operates on 64-bit data blocks?)
(What are the primary characteristics of Bitcoin proof of work?)