1.
MD2, MD5 and SHA-1 are examples of what type of function to checksum an entire file?
Correct Answer
D. Message Digest
Explanation
MD2, MD5, and SHA-1 are examples of message digest functions used to checksum an entire file. Message digest functions take a file as input and produce a fixed-size hash value, also known as a message digest or checksum. This checksum is unique to the input file, and even a small change in the file will result in a significantly different checksum. Therefore, message digest functions are commonly used to verify the integrity of files and ensure they have not been tampered with.
2.
What technology developed by Vivek Pai may improve web access for the developing world?
Correct Answer
B. HashCache
Explanation
HashCache is a technology developed by Vivek Pai that may improve web access for the developing world. HashCache is a caching system that reduces the latency of web page loading by storing frequently accessed content closer to the user. This technology can help improve web access in areas with limited internet connectivity or slower network speeds, as it reduces the need for repeated data requests from distant servers. By caching popular content locally, HashCache can significantly improve the browsing experience and make web access more efficient in the developing world.
3.
Which wireless standard, promising faster speeds, inched towards ratification during 2009?
Correct Answer
C. 802.11n
Explanation
802.11n is the correct answer because it is a wireless standard that was in the process of being ratified during 2009. This standard promised faster speeds compared to previous wireless standards.
4.
Future memory chips may utilize so-called racetrack memory, based on what items?
Correct Answer
C. Magnetic Nanowires
Explanation
Future memory chips may utilize racetrack memory, which is based on magnetic nanowires. Racetrack memory is a type of non-volatile memory technology that uses the movement of magnetic domains along nanowires to store and retrieve data. These nanowires act as "racetracks" where the data can be stored and accessed. This technology has the potential to provide higher storage density, faster data transfer rates, and lower power consumption compared to traditional memory technologies.
5.
How many bits are used in DES encryption?
Correct Answer
A. 56
Explanation
DES encryption uses a key length of 56 bits. This means that the key used for encryption in DES is 56 bits long. The key length is important because it determines the strength and security of the encryption algorithm. In the case of DES, the relatively small key length of 56 bits has led to vulnerabilities and it is no longer considered secure for modern encryption purposes.
6.
Which ITU standard gives guidelines for real-time voice communication on the Internet?
Correct Answer
B. H.323
Explanation
H.323 is the correct answer because it is an ITU standard that provides guidelines for real-time voice communication over IP networks, including the Internet. It defines protocols for establishing, controlling, and terminating multimedia sessions, allowing for audio, video, and data communication. H.323 has been widely adopted and is used in various applications such as video conferencing, voice over IP (VoIP) systems, and unified communications.
7.
Which intrusion technique involves sequentially scanning IP addresses?
Correct Answer
B. Address Space Probe
Explanation
The intrusion technique that involves sequentially scanning IP addresses is known as Address Space Probe. In this technique, the attacker systematically scans a range of IP addresses to identify vulnerable systems or services. By scanning sequentially, the attacker can cover a large number of IP addresses and potentially discover targets for further exploitation. This technique is commonly used to gather information about a network and identify potential entry points for an attack.
8.
What does "DSSS" stand for in the technology used in 802.11b networking?
Correct Answer
C. Direct-Sequence Spread-Spectrum
Explanation
DSSS stands for Direct-Sequence Spread-Spectrum in the technology used in 802.11b networking. Direct-Sequence Spread-Spectrum is a method of transmitting data over a radio frequency by spreading the signal across a wide bandwidth. This technique helps to improve the reliability and security of wireless communication by reducing interference and increasing resistance to jamming.
9.
What type of byte-by-byte encryption can be used on devices with little memory?
Correct Answer
A. Stream CypHer
Explanation
Stream ciphers are a type of byte-by-byte encryption that can be used on devices with limited memory. Unlike block ciphers, which encrypt data in fixed-size blocks, stream ciphers encrypt data one byte at a time. This makes them suitable for devices with little memory, as they require less storage space to operate efficiently. Stream ciphers generate a keystream, which is combined with the plaintext using a bitwise XOR operation to produce the ciphertext. This process can be performed on the fly, making stream ciphers a practical choice for devices with limited resources.
10.
What standard gives the ability to monitor and control network traffic remotely?
Correct Answer
A. OpenFlow
Explanation
OpenFlow is a standard that allows for the remote monitoring and control of network traffic. It provides a centralized control plane that separates the control and data planes in a network, enabling network administrators to have a global view of the network and make changes to traffic flows remotely. With OpenFlow, administrators can easily manage and optimize network performance, troubleshoot issues, and implement policies across multiple switches and routers. It offers flexibility and scalability, making it a powerful tool for network management.
11.
Who sells the ASA 5500 series of firewall products?
Correct Answer
A. Cisco
Explanation
Cisco sells the ASA 5500 series of firewall products.
12.
WEP is a form of encryption used with wireless networks, in which "WEP" stands for what?
Correct Answer
C. Wired Equivalent Privacy
Explanation
Wired Equivalent Privacy (WEP) is a form of encryption used with wireless networks. It was designed to provide a level of security comparable to that of a wired network. WEP encrypts data transmitted over the network to prevent unauthorized access and eavesdropping. Despite its initial popularity, WEP has been found to have significant vulnerabilities and is no longer considered secure.
13.
What algorithm allows exchanging a secret key over an insecure medium without prior keys?
Correct Answer
B. Diffie-Hellman
Explanation
The Diffie-Hellman algorithm allows exchanging a secret key over an insecure medium without prior keys. This algorithm is based on the concept of modular exponentiation and uses the properties of prime numbers to ensure secure key exchange. It allows two parties to independently generate their own public and private keys, which are then used to compute a shared secret key without ever transmitting it directly. This shared secret key can then be used for secure communication or encryption purposes.
14.
A 2008 post on a message board for which disease caused a disease attack in some readers?
Correct Answer
A. Epilepsy
Explanation
The 2008 post on a message board suggests that there was a discussion about a disease causing a disease attack in some readers. Out of the given options, epilepsy is the most likely answer as it is a neurological disorder characterized by recurrent seizures or attacks.
15.
Bluetooth is one example of which kind of network, abbreviated "WPAN"?
Correct Answer
B. Wireless Personal Area Network
Explanation
Bluetooth is an example of a Wireless Personal Area Network (WPAN). A WPAN is a type of network that connects devices within a short range, typically within 10 meters. Bluetooth technology allows for wireless communication between devices such as smartphones, laptops, and headphones, making it a perfect example of a WPAN.
16.
What standard has been proposed for encrypting and authenticating Internet e-mail data?
Correct Answer
B. S/MIME
Explanation
S/MIME (Secure/Multipurpose Internet Mail Extensions) is the correct answer for the proposed standard for encrypting and authenticating Internet e-mail data. S/MIME is a widely-used protocol that provides a secure way to send and receive emails by encrypting the message content and digitally signing it to ensure its authenticity. It is supported by most email clients and provides end-to-end security for email communication.
17.
The SHA-1 function produces a number with how many bits?
Correct Answer
C. 160
Explanation
The SHA-1 function produces a number with 160 bits. SHA-1 is a cryptographic hash function that takes an input and produces a fixed-size output of 160 bits. This output, also known as a hash value, is commonly used for data integrity and security purposes. The 160-bit length provides a good balance between security and efficiency in most applications.
18.
What term describes a brief fluctuation in a VoIP transmission signal?
Correct Answer
D. Jitter
Explanation
Jitter is the correct answer because it refers to a brief fluctuation in a VoIP transmission signal. It is commonly caused by network congestion, packet loss, or varying delays in the transmission. Jitter can result in poor call quality, including choppy or distorted audio. To mitigate jitter, techniques such as buffering, packet prioritization, and jitter buffers are often used in VoIP systems.