CISSP Lesson 3 PreTest Flashcards Preview

CISSP Exam > CISSP Lesson 3 PreTest > Flashcards

Flashcards in CISSP Lesson 3 PreTest Deck (19)
Loading flashcards...
2
Q

Which is a characteristic of symmetric algorithms?
A) The sender uses a public and a private key to encrypt a message
B) IPSec is used for the key distribution
C) The same key encrypts and decrypts a message
D) The receiver uses multiple keys to decrypt a message

A

The same key encrypts and decrypts a message

3
Q

Cryptography does not provide integrity.
A) TRUE
B) FALSE

A

FALSE

4
Q
What do digital signatures ensure?
A) Nonrepudiation and authentication
B) Confidentiality and availability
C) Integrity and confidentiality
D) Nonrepudiation and integrity
A

Nonrepudiation and integrity

5
Q
Which are the three transformation layers used by AES?
A) Linear mix transform
B) Substitution transform
C) Nonlinear transform
D) Key addition transform
E) Parallel transform
A

Linear mix transform
Nonlinear transform
Key addition transform

6
Q

Which is a characteristic of the Blowfish algorithm?
A) Uses an 80-bit key
B) Key can vary from 32 bits to 448 bits
C) It supports key escrow

A

Key can vary from 32 bits to 448 bits

7
Q

With which two operators will inputs of 1 and 1 result in a 1?
A) AND and XOR
B) OR and XOR
C) OR and AND

A

OR and AND

8
Q

A transposition cipher is an example of which type of cipher?
A) Stream cipher
B) Block cipher
C) Character cipher

A

Block cipher

9
Q

A known plaintext attack will not work well on complex algorithms.
A) TRUE
B) FALSE

A

TRUE

10
Q

What is used to begin a transposition cipher?
A) A numeric value
B) Ciphertext
C) A keyword

A

A keyword

11
Q
Which statements are true regarding DES? Choose all that apply.
A) It is a stream cipher
B) Uses a 56-bit key
C) Uses 12-bit blocks
D) Works in four modes
A

Uses a 56-bit key

Works in four modes

12
Q

What is a strength of asymmetric algorithms?
A) Fast
B) Efficient
C) More secure than symmetric algorithms
D) User maintenance and key management is easy

A

User maintenance and key management is easy

13
Q
Which type of digital signature algorithm has a variable-length key size from 512 bits to 1024 bits?
A) HMAC
B) DSA
C) SHA-1
D) DSS
A

DSA

14
Q

Which is a characteristic of MOSS?
A) Uses CA-managed digital certificates
B) Provides associations between e-mail addresses and certificates
C) Uses both symmetric and asymmetric algorithms

A

Provides associations between e-mail addresses and certificates

15
Q

MD5 produces which size digest?
A) 12-bit
B) 64-bit
C) 160-bit

A

12-bit

16
Q
Which asymmetric algorithm uses modular arithmetic to calculate keys?
A) RSA
B) El Gamal
C) SHA-1
D) DSA
A

El Gamal

17
Q

The underlying encryption algorithm for 3DES is the same as DES.
A) TRUE
B) FALSE

A

TRUE

18
Q

What is a man-in-the-middle attack?
A) An attacker encrypts a known plaintext with every possible key while decrypting the associated ciphertext with every
possible key
B) An attacker sits between an intended sender and receiver
C) An attacker uses two simultaneous brute force attacks

A

An attacker sits between an intended sender and receiver

19
Q

Which IPSec mode is typically used to connect gateways?
A) Tunnel mode
B) Transport mode
C) Transform mode

A

Tunnel mode

20
Q

A PKI uses digital signatures to manage public keys.
A) True
B) False

A

FALSE