Exam 6: Cryptography
Exam 1: The Cissp Exam10 Questions
Exam 2: Access Control20 Questions
Exam 3: Telecommunications and Network Security19 Questions
Exam 4: Information Security Governance and Risk Management20 Questions
Exam 5: Software Development Security20 Questions
Exam 6: Cryptography20 Questions
Exam 7: Security Architecture and Design20 Questions
Exam 8: Operations Security19 Questions
Exam 9: Business Continuity and Disaster Recovery20 Questions
Exam 10: Legal, Regulations, Investigations, and Compliance20 Questions
Exam 11: Physical Environmental Security20 Questions
Select questions type
Which term is used for a message in its original format?
Free
(Multiple Choice)
5.0/5
(44)
Correct Answer:
D
Which term is used for the amount of time and resources that would be needed to break the encryption?
Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
C
Secure Sockets Layer (SSL) is a transport layer protocol that provides encryption, server and client authentication, and message integrity.
Free
(True/False)
4.9/5
(37)
Correct Answer:
True
The Caesar cipher and the Vigenere cipher are two of the earliest forms of substitution ciphers.
(True/False)
4.8/5
(37)
In a hybrid cipher, the asymmetric algorithm provides the keys used for encryption.
(True/False)
4.7/5
(35)
Diffie-Hellman provides secure key distribution, confidentiality,
authentication, and nonrepudiation.
(True/False)
4.9/5
(42)
What should you implement to prevent man-in-the-middle attacks against the Diffie-Hellman algorithm?
(Multiple Choice)
4.8/5
(29)
Which of the following is the most secure encryption scheme that can be used?
(Multiple Choice)
4.8/5
(36)
Which hash function produces 128-, 160-, or 192-bit hash values after performing 24 rounds of computations on 512-bit blocks?
(Multiple Choice)
4.8/5
(30)
A key is a parameter that controls the transformation of plaintext into ciphertext or vice versa.
(True/False)
4.8/5
(36)
The U.S. federal government requires the use of DSA, RSA, or Elliptic Curve DSA (ECDSA) and SHA for digital signatures.
(True/False)
4.8/5
(38)
Which entity creates and signs digital certificates, maintains the certificates, and revokes them when necessary?
(Multiple Choice)
4.9/5
(35)
Which cipher uses 27 shift alphabets with letters being shifted up one place?
(Multiple Choice)
5.0/5
(29)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)