Tuesday 1 September 2015

Latest Top CISSP Multiple Choice Questions And Answers

41) The process used in most block ciphers to increase their strength is
  A. Diffusion
  B. Confusion
  C. Step function
  D. SP-network
 Ans: D

42) The two methods of encrypting data are
  A. Substitution and transposition
  B. Block and stream
  C. Symmetric and asymmetric
  D. DES and AES
Ans: C

43) Cryptography supports all of the core principles of information security except
  A. Availability
  B. Confidentiality
  C. Integrity
  D. Authenticity
Ans: D

44) A way to defeat frequency analysis as a method to determine the key is to use
  A. Substitution ciphers
  B. Transposition ciphers
  C. Polyalphabetic ciphers
  D. Inversion ciphers
Ans: C
 
45) The running key cipher is based on
  A. Modular arithmetic
  B. XOR mathematics
  C. Factoring
  D. Exponentiation
Ans: A

46) The only cipher system said to be unbreakable by brute force is
  A. AES
  B. DES
  C. One-time pad
  D. Triple DES
 Ans: C

47) Messages protected by steganography can be transmitted to
  A. Picture files
  B. Music files
  C. Video files
  D. All of the above
Ans: D

48) a significant action has a state that enables actions on an ADP system to be traced to individuals who may then be held responsible. The action does NOT include:
  A. Violations of security policy.
  B. Attempted violations of security policy.
  C. Non-violations of security policy.
  D. Attempted violations of allowed actions.
Ans: D

49) Which of the following embodies all the detailed actions that personnel are required to follow?
  A. Standards
  B. Guidelines
  C. Procedures
  D. Baselines
Ans: C

50) which of the following choices is NOT part of a security policy?
  A. definition of overall steps of information security and the importance of security
  B. statement of management intend, supporting the goals and principles of information security
  C. definition of general and specific responsibilities for information security management
  D. .description of specific technologies used in the field of information security
Ans: D

More Questions & Answers:-
Page1 Page2 PagePage4 Page5

No comments:

Post a Comment