Exam Prep Questions

1:

This attack requires the attacker to obtain several encrypted messages that have been encrypted using the same encryption algorithm.

  • A. Known plain-text attack
  • B. Cipher-text attack
  • C. Clear-text attack
  • D. Replay attack
2:

Which of the following best describes obtaining plain text from cipher text without a key?

  • A. Frequency analysis
  • B. Cryptanalysis
  • C. Decryption
  • D. Cracking
3:

This attack occurs when the attacker can intercept session keys and reuse them at a later date.

  • A. Known plain-text attack
  • B. Cipher-text attack
  • C. Man-in-the-middle attack
  • D. Replay attack
4:

Which of the following is a disadvantage of symmetric encryption?

  • A. Key size
  • B. Speed
  • C. Key management
  • D. Key strength
5:

Which of the following is not an example of a symmetric algorithm?

  • A. DES
  • B. RC5
  • C. AES
  • D. RSA
6:

Which of the following forms of DES is considered the most vulnerable to attack?

  • A. CBC
  • B. ECB
  • C. CFB
  • D. OFB
7:

DES uses which of the following for a key size?

  • A. 56 bit
  • B. 64 bit
  • C. 96 bit
  • D. 128 bit
8:

What implementation of Triple-DES uses the same key for the first and third iterations?

  • A. DES-EEE3
  • B. HAVAL
  • C. DES-EEE2
  • D. DES-X
9:

Which of the following algorithms is used for key distribution, not encryption or digital signatures?

  • A. El Gamal
  • B. HAVAL
  • C. Diffie-Hellman
  • D. ECC
10:

What hashing algorithm produces a 160-bit output?

  • A. MD2
  • B. MD4
  • C. SHA-1
  • D. El Gamal

The CISSP Cram Sheet

A Note from Series Editor Ed Tittel

About the Author

Acknowledgments

We Want to Hear from You!

Introduction

Self-Assessment

The CISSP Certification Exam

Physical Security

Security-Management Practices

Access-Control Systems and Methodology

System Architecture and Models

Telecommunications and Network Security

Applications and Systems-Development Security

Operations Security

Business Continuity Planning

Law, Investigations, and Ethics

Cryptography

Practice Exam 1

Answers to Practice Exam 1

Practice Exam 2

Answers to Practice Exam 2



CISSP Exam Cram 2
CISSP Exam Cram 2
ISBN: 078973446X
EAN: 2147483647
Year: 2003
Pages: 204
Authors: Michael Gregg

Flylib.com © 2008-2020.
If you may any questions please contact us: flylib@qtcs.net