CISSP Lesson 3 PreTest Flashcards
Which is a characteristic of symmetric algorithms?
A) The sender uses a public and a private key to encrypt a message
B) IPSec is used for the key distribution
C) The same key encrypts and decrypts a message
D) The receiver uses multiple keys to decrypt a message
The same key encrypts and decrypts a message
Cryptography does not provide integrity.
A) TRUE
B) FALSE
FALSE
What do digital signatures ensure? A) Nonrepudiation and authentication B) Confidentiality and availability C) Integrity and confidentiality D) Nonrepudiation and integrity
Nonrepudiation and integrity
Which are the three transformation layers used by AES? A) Linear mix transform B) Substitution transform C) Nonlinear transform D) Key addition transform E) Parallel transform
Linear mix transform
Nonlinear transform
Key addition transform
Which is a characteristic of the Blowfish algorithm?
A) Uses an 80-bit key
B) Key can vary from 32 bits to 448 bits
C) It supports key escrow
Key can vary from 32 bits to 448 bits
With which two operators will inputs of 1 and 1 result in a 1?
A) AND and XOR
B) OR and XOR
C) OR and AND
OR and AND
A transposition cipher is an example of which type of cipher?
A) Stream cipher
B) Block cipher
C) Character cipher
Block cipher
A known plaintext attack will not work well on complex algorithms.
A) TRUE
B) FALSE
TRUE
What is used to begin a transposition cipher?
A) A numeric value
B) Ciphertext
C) A keyword
A keyword
Which statements are true regarding DES? Choose all that apply. A) It is a stream cipher B) Uses a 56-bit key C) Uses 12-bit blocks D) Works in four modes
Uses a 56-bit key
Works in four modes
What is a strength of asymmetric algorithms?
A) Fast
B) Efficient
C) More secure than symmetric algorithms
D) User maintenance and key management is easy
User maintenance and key management is easy
Which type of digital signature algorithm has a variable-length key size from 512 bits to 1024 bits? A) HMAC B) DSA C) SHA-1 D) DSS
DSA
Which is a characteristic of MOSS?
A) Uses CA-managed digital certificates
B) Provides associations between e-mail addresses and certificates
C) Uses both symmetric and asymmetric algorithms
Provides associations between e-mail addresses and certificates
MD5 produces which size digest?
A) 12-bit
B) 64-bit
C) 160-bit
12-bit
Which asymmetric algorithm uses modular arithmetic to calculate keys? A) RSA B) El Gamal C) SHA-1 D) DSA
El Gamal