(A company wants to use certificates issued by a root CA to demonstrate to customers that it is a legitimate company being hosted by a cloud provider. Who needs to trust the root CA public key?)
(Why should an asymmetric private key be used to encrypt the digest of an application?)
(A security analyst uses a polyalphabetic substitution cipher with a keyword of YELLOW to encrypt a message. Which cipher should be used to encrypt the message?)
(What is the length of the Initialization Vector (IV) in WEP?)
(What describes a true random number generator?)
(Why should a forensic investigator create a hash of a victim’s hard drive and of the bitstream copy of the hard drive?)
(Which encryption algorithm encrypts with one key, decrypts with another key, and then encrypts with the first key?)
(How does Electronic Codebook (ECB) mode encryption function?)
(How does adding salt to a password improve security?)
(What makes the RC4 cipher unique compared to RC5 and RC6?)