0% found this document useful (0 votes)
21 views

Network Security 16

Network Security 16

Uploaded by

Aditya Mishra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Network Security 16

Network Security 16

Uploaded by

Aditya Mishra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

11/12/2016 techbus.safaribooksonline.com/print?

xmlid=9781118028278%2Freview_questions0051

Username:AdityaMishraBook:CISSP:CertifiedInformationSystemsSecurityProfessionalStudyGuide,FifthEdition.Nopartofanychapterorbookmaybe
reproducedortransmittedinanyformbyanymeanswithoutthepriorwrittenpermissionforreprintsandexcerptsfromthepublisherofthebookorchapter.
RedistributionorotherusethatviolatesthefairuseprivilegeunderU.S.copyrightlaws(see17USC107)orthatotherwiseviolatestheseTermsofServiceis
strictlyprohibited.ViolatorswillbeprosecutedtothefullextentofU.S.FederalandMassachusettslaws.

ReviewQuestions
1.IntheRSApublickeycryptosystem,whichoneofthefollowingnumberswillalwaysbelargest?
A.e

B.n

C.p

D.q

2.WhichcryptographicalgorithmformsthebasisoftheElGamalcryptosystem?
A.RSA

B.DiffieHellman

C.3DES

D.IDEA

3.IfRichardwantstosendanencryptedmessagetoSueusingapublickeycryptosystem,whichkeydoesheusetoencryptthemessage?
A.Richardspublickey

B.Richardsprivatekey

C.Suespublickey

D.Suesprivatekey

4.Ifa2,048bitplaintextmessagewereencryptedwiththeElGamalpublickeycryptosystem,howlongwouldtheresultingciphertextmessagebe?
A.1,024bits

B.2,048bits

C.4,096bits

D.8,192bits

5. Acme Widgets currently uses a 1,024bit RSA encryption standard companywide. The company plans to convert from RSA to an elliptic curve cryptosystem. If it wants to
maintainthesamecryptographicstrength,whatECCkeylengthshouldituse?
A.160bits

B.512bits

C.1,024bits

D.2,048bits

6.Johnwantstoproduceamessagedigestofa2,048bytemessageheplanstosendtoMary.IfheusestheSHA1hashingalgorithm,whatsizewillthemessagedigestforthis
particularmessagebe?
A.160bits

B.512bits

C.1,024bits

D.2,048bits

7.Whichoneofthefollowingtechnologiesisconsideredflawedandshouldnolongerbeused?
A.SHA2

B.PGP

C.WEP

D.SSL

8.WhatencryptiontechniquedoesWPAusetoprotectwirelesscommunications?
A.TKIP

B.DES

C.3DES

D.AES

9.RichardreceivedanencryptedmessagesenttohimfromSue.Whichkeyshouldheusetodecryptthemessage?
A.Richardspublickey

B.Richardsprivatekey

C.Suespublickey

D.Suesprivatekey

http://techbus.safaribooksonline.com/print?xmlid=9781118028278%2Freview_questions0051 1/3
11/12/2016 techbus.safaribooksonline.com/print?xmlid=9781118028278%2Freview_questions0051
10.RichardwantstodigitallysignamessagehessendingtoSuesothatSuecanbesurethemessagecamefromhimwithoutmodificationwhileintransit.Whichkeyshouldhe
usetoencryptthemessagedigest?
A.Richardspublickey

B.Richardsprivatekey

C.Suespublickey

D.Suesprivatekey

11.WhichoneofthefollowingalgorithmsisnotsupportedbytheDigitalSignatureStandard?
A.DigitalSignatureAlgorithm

B.RSA

C.ElGamalDSA

D.EllipticCurveDSA

12.WhichInternationalTelecommunicationsUnion(ITU)standardgovernsthecreationandendorsementofdigitalcertificatesforsecureelectroniccommunication?
A.X.500

B.X.509

C.X.900

D.X.905

13.Whatcryptosystemprovidestheencryption/decryptiontechnologyforthecommercialversionofPhilZimmermansPrettyGoodPrivacysecureemailsystem?
A.ROT13

B.IDEA

C.ECC

D.ElGamal

14.WhatTCP/IPcommunicationsportisutilizedbySecureSocketsLayertraffic?
A.80

B.220

C.443

D.559

15.WhattypeofcryptographicattackrenderedDoubleDES(2DES)nomoreeffectivethanstandardDESencryption?
A.Birthdayattack

B.Chosenciphertextattack

C.Meetinthemiddleattack

D.Maninthemiddleattack

16.Whichofthefollowingsecuritysystemswascreatedtosupporttheuseofstoredvaluepaymentcards?
A.SET

B.IPSec

C.MONDEX

D.PGP

17.WhichofthefollowinglinkswouldbeprotectedbyWPAencryption?
A.Firewalltofirewall

B.Routertofirewall

C.Clienttowirelessaccesspoint

D.Wirelessaccesspointtorouter

18.Whatisthemajordisadvantageofusingcertificaterevocationlists?
A.Keymanagement

B.Latency

C.Recordkeeping

D.Vulnerabilitytobruteforceattacks

19.Whichoneofthefollowingencryptionalgorithmsisnowconsideredinsecure?
A.ElGamal

B.RSA

C.Skipjack

D.MerkleHellmanKnapsack

20.WhatdoesIPSecdefine?
A.Allpossiblesecurityclassificationsforaspecificconfiguration

B.Aframeworkforsettingupasecurecommunicationchannel

C.ThevalidtransitionstatesintheBibamodel

http://techbus.safaribooksonline.com/print?xmlid=9781118028278%2Freview_questions0051 2/3
11/12/2016 techbus.safaribooksonline.com/print?xmlid=9781118028278%2Freview_questions0051
D.TCSECsecuritycategories

http://techbus.safaribooksonline.com/print?xmlid=9781118028278%2Freview_questions0051 3/3

You might also like