1: |
This attack requires the attacker to obtain several encrypted messages that have been encrypted using the same encryption algorithm.
|
2: |
Which of the following best describes obtaining plain text from cipher text without a key?
|
3: |
This attack occurs when the attacker can intercept session keys and reuse them at a later date.
|
4: |
Which of the following is a disadvantage of symmetric encryption?
|
5: |
Which of the following is not an example of a symmetric algorithm?
|
6: |
Which of the following forms of DES is considered the most vulnerable to attack?
|
7: |
DES uses which of the following for a key size?
|
8: |
What implementation of Triple-DES uses the same key for the first and third iterations?
|
9: |
Which of the following algorithms is used for key distribution, not encryption or digital signatures?
|
10: |
What hashing algorithm produces a 160-bit output?
|
The CISSP Cram Sheet
A Note from Series Editor Ed Tittel
About the Author
Acknowledgments
We Want to Hear from You!
Introduction
Self-Assessment
The CISSP Certification Exam
Physical Security
Security-Management Practices
Access-Control Systems and Methodology
System Architecture and Models
Telecommunications and Network Security
Applications and Systems-Development Security
Operations Security
Business Continuity Planning
Law, Investigations, and Ethics
Cryptography
Practice Exam 1
Answers to Practice Exam 1
Practice Exam 2
Answers to Practice Exam 2