Which one of the following options describes the concept of using a different key for encrypting and decrypting data?
A. symmetric encryption
B. avalanche effect
C. asymmetric encryption
D. cipher text
Which one of the following methods allows you to verify entity authentication, data integrity, and authenticity of communications, without encrypting the actual data?
A. Both parties calculate an authenticated MD5 hash value of the data accompanying the message - one party uses the private key, while the other party uses the public key.
B. Both parties to the communication use the same secret key to produce a message authentication code to accompany the message.
C. Both parties calculate a CRC32 of the data before and after transmission of the message.
D. Both parties obfuscate the data with XOR and a known key before and after transmission of the message.
Which two of the following options are impacts of cryptography on security investigations? (Choose two.)
A. All the employee's SSL/TLS outbound traffic should be decrypted and inspected since it requires minimal resources on the security appliance.
B. Cryptographic attacks can be used to find a weakness in the cryptographic algorithms.
C. With the increased legitimate usage of HTTPS traffic, attackers have taken advantage of this blind spot to launch attacks over HTTPS more than ever before.
D. Encryption does not pose a threat to the ability of law enforcement authorities to gain access to information for investigating and prosecuting cybercriminal activities.
Which four encryption protocols and protective algorithms are identified in the NSA Suite B specification? (Choose four.)
A. AES
B. MD5
C. ECDSA
D. Diffie-Hellman Group5
E. ECDH
F. 3DES
G. SHA-2
Which two statements are correct regarding NSA Suite B? (Choose two.)
A. Use AES with 128- or 256-bit keys in the GCM mode.
B. The SHA-1 message digest has stronger security than SHA-2.
C. NSA Suite B calls for AES CBC mode because it can provide authenticated encryption.
D. NSA Suite B calls for ECDH, which is a more advanced variant of the Diffie-Hellman algorithm using the elliptic curve mathematics model.
Which two of the following options are two key factors in determining the key length requirement? (Choose two.)
A. Data that is more sensitive and needs to be kept secret longer must use longer keys.
B. Choose the key length according to the type of encryption algorithm that is to be used.
C. You should choose the key length so that it protects data confidentiality or integrity for an adequate time.
D. Key length depends on the support of the device that will be using the key.
Which five of the following options does the process of key management deal with? (Choose five.)
A. subject identity
B. secure generation
C. verification
D. identification
E. exchange
F. storage
G. matching
H. destruction of keys
Which one of the following options explains key space as it relates to cryptography?
A. amount of time that a brute force attempt would take to discover the key
B. number of possible keys that could be generated by an algorithm
C. number of bits that are contained in a key
D. randomness of a generated key
Many legacy cipher suites available in TLS are deemed insecure. Which three of the following traits make them insecure? (Choose three.)
A. cipher suites using DES
B. cipher suites using RC4
C. cipher suites using AES
D. cipher suites using MD5
E. cipher suites using SHA-256
The ECDHE_ECDSA part of the cipher list identifies which one of the following algorithms?
A. authentication and key exchange
B. encryption
C. message authentication code
D. pseudorandom function
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 210-250 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.