(What is the Enigma machine known for in the history of cryptography?)
(A security engineer is implementing device authentication as a form of two-factor authentication in a Public Key Infrastructure (PKI) environment. What should be used as a second form of authentication?)
(A security analyst uses a polyalphabetic substitution cipher with a keyword of YELLOW to encrypt a message. Which cipher should be used to encrypt the message?)
(Which type of encryption is Advanced Encryption Standard (AES) considered to be?)
(How does a cryptographic policy contribute to incident response?)
(What makes the RC4 cipher unique compared to RC5 and RC6?)
(What is an attribute of RC4 when used with WEP?)
(What is the relationship between Secure Sockets Layer (SSL) and Transport Layer Security (TLS)?)
(What are the primary characteristics of Bitcoin proof of work?)
(What is a characteristic of a hash function?)