(What is the length of the Initialization Vector (IV) in WEP?)
(Which mechanism can be applied to protect the integrity of plaintext when using AES?)
(Which type of network were VPN connections originally designed to tunnel through?)
(What type of encryption uses different keys to encrypt and decrypt the message?)
(Why should an asymmetric private key be used to encrypt the digest of an application?)
(An administrator has configured a Virtual Private Network (VPN) connection utilizing IPsec transport mode with Encapsulating Security Payload (ESP) between a server in the corporate office and a client computer in the remote office. In which situation can the packet content be inspected?)
(Which operation can be performed on a certificate during the “Issued” stage?)
(What is the value of 23 mod 6?)
(Which wireless security standard uses an authentication server with 802.1X and EAP?)
(Which cryptographic operation uses a single key?)
(Which attack may take the longest amount of time to achieve success?)
(What is an alternative to using a Certificate Revocation List (CRL) with certificates?)
(Which symmetric encryption technique uses a 112-bit key size and a 64-bit block size?)
(Which certificate encoding process is binary-based?)
(Which technique involves spotting variations in encrypted data and plotting how the characters relate to standard English characters?)
(Which type of exploit involves looking for different inputs that generate the same hash?)
(Employee A needs to send Employee B a symmetric key for confidential communication. Which key is used to encrypt the symmetric key?)
(Which encryption algorithm encrypts with one key, decrypts with another key, and then encrypts with the first key?)