This attack requires the attacker to obtain several encrypted messages that have been encrypted using the same encryption algorithm.
Which of the following best describes obtaining plain text from cipher text without a key?
This attack occurs when the attacker can intercept session keys and reuse them at a later date.
Which of the following is a disadvantage of symmetric encryption?
Which of the following is not an example of a symmetric algorithm?
Which of the following forms of DES is considered the most vulnerable to attack?
DES uses which of the following for a key size?
What implementation of Triple-DES uses the same key for the first and third iterations?
Which of the following algorithms is used for key distribution, not encryption or digital signatures?
What hashing algorithm produces a 160-bit output?
The CISSP Cram Sheet
A Note from Series Editor Ed Tittel
About the Author
We Want to Hear from You!
The CISSP Certification Exam
Access-Control Systems and Methodology
System Architecture and Models
Telecommunications and Network Security
Applications and Systems-Development Security
Business Continuity Planning
Law, Investigations, and Ethics
Practice Exam 1
Answers to Practice Exam 1
Practice Exam 2
Answers to Practice Exam 2