(What is an alternative to using a Certificate Revocation List (CRL) with certificates?)
(A security analyst uses a polyalphabetic substitution cipher with a keyword of YELLOW to encrypt a message. Which cipher should be used to encrypt the message?)
(Which type of exploit involves looking for different inputs that generate the same hash?)
(A Linux user password is identified as follows:
$2a$08$AbCh0RCM8p8FGaYvRLI0H.Kng54gcnWCOQYIhas708UEZRQQjGBh4
Which hash algorithm should be used to salt this password?)
(A security engineer is implementing device authentication as a form of two-factor authentication in a Public Key Infrastructure (PKI) environment. What should be used as a second form of authentication?)
(Which mode of encryption uses an Initialization Vector (IV) to encrypt the first block and then uses the result to encrypt the next block?)