2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet230/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   226   227   228   229   230   231   232   233   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

A.
Nonrepudiation
B.
Confidentiality
C.
Availability
D.
Integrity
3.
What is the length of the cryptographic key used in the Data Encryption Standard (DES) 
cryptosystem?
A.
56 bits
B.
128 bits
C.
192 bits
D.
256 bits
4.
What type of cipher relies on changing the location of characters within a message to 
achieve confidentiality?
A.
Stream cipher
B.
Transposition cipher
C.
Block cipher
D.
Substitution cipher
5.
Which one of the following is not a possible key length for the Advanced Encryption Stan-
dard Rijndael cipher?
A.
56 bits
B.
128 bits
C.
192 bits
D.
256 bits
6.
Which one of the following cannot be achieved by a secret key cryptosystem?
A.
Nonrepudiation
B.
Confidentiality


Review Questions 
233
C.
Authentication
D.
Key distribution
7.
When correctly implemented, what is the only cryptosystem known to be unbreakable?
A.
Transposition cipher
B.
Substitution cipher
C.
Advanced Encryption Standard
D.
One-time pad
8.
What is the output value of the mathematical function 
16 mod 3
?
A.
0
B.
1
C.
3
D.
5
9.
What block size is used by the 3DES encryption algorithm?
A.
32 bits
B.
64 bits
C.
128 bits
D.
256 bits
10.
Which one of the following cipher types operates on large pieces of a message rather than 
individual characters or bits of a message?
A.
Stream cipher
B.
Caesar cipher
C.
Block cipher
D.
ROT3 cipher
11.
What is the minimum number of cryptographic keys required for secure two-way commu-
nications in symmetric key cryptography?
A.
One
B.
Two
C.
Three
D.
Four
12.
Dave is developing a key escrow system that requires multiple people to retrieve a key but 
does not depend on every participant being present. What type of technique is he using?
A.
Split knowledge
B.
M of N Control
C.
Work function
D.
Zero-knowledge proof


234
Chapter 6 

Cryptography and Symmetric Key Algorithms
13.
Which one of the following Data Encryption Standard (DES) operating modes can be used 
for large messages with the assurance that an error early in the encryption/decryption pro-
cess won’t spoil results throughout the communication?
A.
Cipher Block Chaining (CBC)
B.
Electronic Code Book (ECB)
C.
Cipher Feedback (CFB)
D.
Output feedback (OFB)
14.
Many cryptographic algorithms rely on the difficulty of factoring the product of large 
prime numbers. What characteristic of this problem are they relying on?
A.
It contains diffusion.
B.
It contains confusion.
C.
It is a one-way function.
D.
It complies with Kerchoff’s principle.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   226   227   228   229   230   231   232   233   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish