Exam Prep Questions


This attack requires the attacker to obtain several encrypted messages that have been encrypted using the same encryption algorithm.

  • A. Known plain-text attack
  • B. Cipher-text attack
  • C. Clear-text attack
  • D. Replay attack

Which of the following best describes obtaining plain text from cipher text without a key?

  • A. Frequency analysis
  • B. Cryptanalysis
  • C. Decryption
  • D. Cracking

This attack occurs when the attacker can intercept session keys and reuse them at a later date.

  • A. Known plain-text attack
  • B. Cipher-text attack
  • C. Man-in-the-middle attack
  • D. Replay attack

Which of the following is a disadvantage of symmetric encryption?

  • A. Key size
  • B. Speed
  • C. Key management
  • D. Key strength

Which of the following is not an example of a symmetric algorithm?

  • A. DES
  • B. RC5
  • C. AES
  • D. RSA

Which of the following forms of DES is considered the most vulnerable to attack?

  • A. CBC
  • B. ECB
  • C. CFB
  • D. OFB

DES uses which of the following for a key size?

  • A. 56 bit
  • B. 64 bit
  • C. 96 bit
  • D. 128 bit

What implementation of Triple-DES uses the same key for the first and third iterations?

  • A. DES-EEE3
  • B. HAVAL
  • C. DES-EEE2
  • D. DES-X

Which of the following algorithms is used for key distribution, not encryption or digital signatures?

  • A. El Gamal
  • B. HAVAL
  • C. Diffie-Hellman
  • D. ECC

What hashing algorithm produces a 160-bit output?

  • A. MD2
  • B. MD4
  • C. SHA-1
  • D. El Gamal

CISSP Exam Cram 2
CISSP Exam Cram 2
ISBN: 078973446X
EAN: 2147483647
Year: 2003
Pages: 204
Authors: Michael Gregg
Simiral book on Amazon

Flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net