Tuesday 1 September 2015

Most Recently Asked CISSP Multiple Choice Questions And Answers

31) Asymmetric key cryptography is used for all of the following except:
  A. Encryption of data
  B. Access control
  C. Nonrepudiation
  D. Steganography
 Ans: D

32) The most common forms of asymmetric key cryptography include
  A. Diffie–Hellman
  B. Rijndael
  C. Blowfish
  D. SHA-256
 Ans: A

33) What is an important disadvantage of using a public key algorithm compared to a symmetric algorithm?
  A. A symmetric algorithm provides better access control.
  B. A symmetric algorithm is a faster process.
  C. A symmetric algorithm provides nonrepudiation of delivery.
  D. A symmetric algorithm is more difficult to implement.
Ans: B

34) When a user needs to provide message integrity, what options may be best?
  A. Send a digital signature of the message to the recipient
  B. Encrypt the message with a symmetric algorithm and send it
  C. Encrypt the message with a private key so the recipient can decrypt with the corresponding public key
  D. Create a checksum, append it to the message, encrypt the message, then send to recipient.
Ans: D

35) A certificate authority provides what benefits to a user?
  A. Protection of public keys of all users
  B. History of symmetric keys
  C. Proof of nonrepudiation of origin
  D. Validation that a public key is associated with a particular user
Ans: D

36) What is the output length of a RIPEMD-160 hash?
  A. 160 bits
  B. 150 bits
  C. 128 bits
  D. 104 bits
 Ans:  A

37) ANSI X9.17 is concerned primarily with
  A. Protection and secrecy of keys
  B. Financial records and retention of encrypted data
  C. Formalizing a key hierarchy
  D. The lifespan of key-encrypting keys (KKMs)
Ans: A

38) When a certificate is revoked, what is the proper procedure?
  A. Setting new key expiry dates
  B. Updating the certificate revocation list
  C. Removal of the private key from all directories
  D. Notification to all employees of revoked keys
 Ans: B

39) What is not true about link encryption?
  A. Link encryption encrypts routing information.
  B. Link encryption is often used for Frame Relay or satellite links.
  C. Link encryption is suitable for high-risk environments.
  D. Link encryption provides better traffic flow confidentiality.
Ans: C

40) A_________ is the sequence that controls the operation of the cryptographic algorithm.
  A. Encoder
  B. Decoder wheel
  C. Cryptovariable
  D. Cryptographic routine
 Ans:  C

More Questions & Answers:-
Page1 Page2 Page3 Page4 Page5

No comments:

Post a Comment