CISSP Security Engineering Certification Practice Exam Set 10

Which encryption algorithm is best suited for communication to the handheld wireless device?


Options are :

  • SHA
  • None
  • RSA
  • ECC (Elliptic Curve encryption system)
  • RC4

Answer : ECC (Elliptic Curve encryption system)

FIPS-140 is the standard by which the information security of the following?


Options are :

  • hardware security modules
  • None
  • Hardware and software cryptographic modules
  • Cryptographic Services Service Providers
  • smart cards

Answer : Hardware and software cryptographic modules

Which of the following is a symmetric encryption algorithm?


Options are :

  • None
  • elliptic curve
  • el Gamal
  • RSA
  • RC5

Answer : RC5

CISSP - Security and Risk Management Pratice Questions

Public key infrastructure (PKI) consists of programs, formats, procedures, communication protocols, security policies, and Public Key Cryptographic mechanisms are employed extensively for a wide range dispersed people to communicate in a safe and predictable fashion.This infrastructure is based on which of the following Standard?


Options are :

  • X.25
  • None
  • X.500
  • X.509
  • X.400-

Answer : X.509

Sentence. A digital signature is:


Options are :

  • the hash value is encrypted with the private key of the sender
  • the hash value that is encrypted Sender s public key
  • a hash value, encrypted by the sender with the session key
  • Senders signature to be signed and scanned in digital form
  • None

Answer : the hash value is encrypted with the private key of the sender

What is the primary role of the cross-certification?


Options are :

  • To get an overall picture of PKI hierarchy
  • None
  • to set up a direct trust to another root CA.
  • To prevent the cancellation of user certificates CA Certificate Revocation
  • in order to create confidence in the various PKIs

Answer : in order to create confidence in the various PKIs

What can be defined as, for example, two different keys for generating ciphertext from the same plaintext?


Options are :

  • None
  • key clusters
  • key collision
  • hashing
  • argot a collision

Answer : key clusters

Which of the following modes of DES is likely to be used as database encryption?


Options are :

  • None
  • The Cipher Feedback (CFB)
  • Electronic Book (ECB)
  • Cipher Block Chaining (CBC)
  • Output feedback (OFB)

Answer : Electronic Book (ECB)

Which of the following is not an example of an asymmetric key algorithm?


Options are :

  • None
  • An elliptic curve cryptosystem (ECC)
  • Merkle-Hellman knapsack
  • Advanced Encryption Standard (AES)
  • Diffie-Hellman

Answer : Advanced Encryption Standard (AES)

CISSP Security Engineering Certification Practice Exam Set 1

What algorithm is selected AES algorithm that replaces the DES algorithm is?


Options are :

  • None
  • Rijndael
  • blowfish
  • RC6
  • twofish

Answer : Rijndael

What is the result of a hashing algorithm to apply to the message?


Options are :

  • None
  • Digital signature
  • A message digest
  • a ciphertext
  • Plain text

Answer : A message digest

Which of the following protective equipment is used to protect the spot a few inches of the object, is not so much the general security monitoring room?


Options are :

  • audio detectors
  • capacitance detectors
  • Field-using equipment
  • None
  • Wave pattern motion detectors

Answer : capacitance detectors

Where the DES mode, will block the plaintext and the key will always give the same ciphertext?


Options are :

  • The Cipher Feedback (CFB)
  • None
  • Output feedback (OFB)
  • Electronic Book (ECB)
  • Counter mode (CTR)

Answer : Electronic Book (ECB)

Which of the following is a hash algorithm?


Options are :

  • SHA
  • RSA
  • None
  • Diffie Hellman (DH)
  • Elliptic Curve Cryptography (ECC)

Answer : SHA

Which of the following keys is the shortest life span?


Options are :

  • private key
  • None
  • secret key
  • the public key
  • session key

Answer : session key

CISSP Security Assessment Testing Security Operations Exam Set 6

Which of the following is NOT an asymmetric key algorithm?


Options are :

  • Data Encryption Standard (DES)
  • An elliptic curve cryptosystem (ECC)
  • None
  • el Gamal
  • RSA

Answer : Data Encryption Standard (DES)

Fill in the blanks. When using PKI, I digitally sign a message on my ______ key. To check out my signature to use my ______ key.


Options are :

  • public private
  • Private / Public
  • None
  • Balanced / unbalanced
  • Private / Symmetrical

Answer : Private / Public

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions

Subscribe to See Videos

Subscribe to my Youtube channel for new videos : Subscribe Now