CISSP Lesson 3 PreTest Flashcards

2
Q

Which is a characteristic of symmetric algorithms?
A) The sender uses a public and a private key to encrypt a message
B) IPSec is used for the key distribution
C) The same key encrypts and decrypts a message
D) The receiver uses multiple keys to decrypt a message

A

The same key encrypts and decrypts a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptography does not provide integrity.
A) TRUE
B) FALSE

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
What do digital signatures ensure?
A) Nonrepudiation and authentication
B) Confidentiality and availability
C) Integrity and confidentiality
D) Nonrepudiation and integrity
A

Nonrepudiation and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which are the three transformation layers used by AES?
A) Linear mix transform
B) Substitution transform
C) Nonlinear transform
D) Key addition transform
E) Parallel transform
A

Linear mix transform
Nonlinear transform
Key addition transform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which is a characteristic of the Blowfish algorithm?
A) Uses an 80-bit key
B) Key can vary from 32 bits to 448 bits
C) It supports key escrow

A

Key can vary from 32 bits to 448 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

With which two operators will inputs of 1 and 1 result in a 1?
A) AND and XOR
B) OR and XOR
C) OR and AND

A

OR and AND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A transposition cipher is an example of which type of cipher?
A) Stream cipher
B) Block cipher
C) Character cipher

A

Block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A known plaintext attack will not work well on complex algorithms.
A) TRUE
B) FALSE

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is used to begin a transposition cipher?
A) A numeric value
B) Ciphertext
C) A keyword

A

A keyword

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which statements are true regarding DES? Choose all that apply.
A) It is a stream cipher
B) Uses a 56-bit key
C) Uses 12-bit blocks
D) Works in four modes
A

Uses a 56-bit key

Works in four modes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a strength of asymmetric algorithms?
A) Fast
B) Efficient
C) More secure than symmetric algorithms
D) User maintenance and key management is easy

A

User maintenance and key management is easy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which type of digital signature algorithm has a variable-length key size from 512 bits to 1024 bits?
A) HMAC
B) DSA
C) SHA-1
D) DSS
A

DSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which is a characteristic of MOSS?
A) Uses CA-managed digital certificates
B) Provides associations between e-mail addresses and certificates
C) Uses both symmetric and asymmetric algorithms

A

Provides associations between e-mail addresses and certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MD5 produces which size digest?
A) 12-bit
B) 64-bit
C) 160-bit

A

12-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which asymmetric algorithm uses modular arithmetic to calculate keys?
A) RSA
B) El Gamal
C) SHA-1
D) DSA
A

El Gamal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The underlying encryption algorithm for 3DES is the same as DES.
A) TRUE
B) FALSE

A

TRUE

18
Q

What is a man-in-the-middle attack?
A) An attacker encrypts a known plaintext with every possible key while decrypting the associated ciphertext with every
possible key
B) An attacker sits between an intended sender and receiver
C) An attacker uses two simultaneous brute force attacks

A

An attacker sits between an intended sender and receiver

19
Q

Which IPSec mode is typically used to connect gateways?
A) Tunnel mode
B) Transport mode
C) Transform mode

A

Tunnel mode

20
Q

A PKI uses digital signatures to manage public keys.
A) True
B) False

A

FALSE