00:00

QUESTION 121

Harper, a software engineer, is developing an email application. To ensure the confidentiality of email messages. Harper uses a symmetric-key block cipher having a classical 12- or 16-round Feistel network with a block size of 64 bits for encryption, which includes large 8 x 32-bit S-boxes (S1, S2, S3, S4) based on bent functions, modular addition and subtraction, key-dependent rotation, and XOR operations. This cipher also uses a masking key(Km1)and a rotation key (Kr1) for performing its functions. What is the algorithm employed by Harper to secure the email messages?

Correct Answer: A

QUESTION 122

Security administrator John Smith has noticed abnormal amounts of traffic coming from local computers at night. Upon reviewing, he finds that user data have been exfilltrated by an attacker. AV tools are unable to find any malicious software, and the IDS/IPS has not reported on any non-whitelisted programs, what type of malware did the attacker use to bypass the company's application whitelisting?

Correct Answer: C
https://www.mcafee.com/enterprise/en-us/security-awareness/ransomware/what-is-fileless-malware.html

QUESTION 123

Which type of attack attempts to overflow the content-addressable memory (CAM) table in an Ethernet switch?

Correct Answer: C

QUESTION 124

What would be the fastest way to perform content enumeration on a given web server by using the Gobuster tool?

Correct Answer: A

QUESTION 125

What hacking attack is challenge/response authentication used to prevent?

Correct Answer: A