CISSP Security Engineering Certification Practice Exam Set 2

Which of the following is NOT a feature in one way hash function?


Options are :

  • It converts the message into a fixed-length message will seal an arbitrary length. (Correct)
  • It converts a message of arbitrary length will be a fixed length message digest
  • None
  • It is computationally infeasible to construct two different messages with the same summary.
  • Allow Digest value is computationally infeasible to find a corresponding message.

Answer : It converts the message into a fixed-length message will seal an arbitrary length.

Question No: 243 Which of the following is defined in the Internet, IPSec, key-establishment protocol, based in part on OAKLEY, which is intended to introduce an authenticated keying material for use ISAKMP and other security associations?


Options are :

  • Simple Key-management of Internet Protocols (skip)
  • Key Exchange Algorithm (KEA)
  • Security Association Authentication Protocol (SAAP)
  • None
  • Internet Key Exchange (IKE) (Correct)

Answer : Internet Key Exchange (IKE)

A physical security context, the outer door equipped with an electronic lock-unlock configured to ignore signals from the building in an emergency access control system in the event of a problem (fire, intrusion, a power failure), which had the following composition?


Options are :

  • fault protected (Correct)
  • Fail Open
  • Soft Fail
  • foolproof
  • None

Answer : fault protected

What type of fire extinguisher is the most suitable digital data processing?


Options are :

  • type B
  • None
  • Type C (Correct)
  • A type
  • type D

Answer : Type C

CISSP Security Engineering Certification Practice Exam Set 5

The instantaneous high voltage is:


Options are :

  • None
  • blackout
  • fault
  • spike (Correct)
  • wave

Answer : spike

What is not true about the one-way hash function?


Options are :

  • None
  • Hash can not be rotated to get the message are used to create the hash
  • It provides message integrity
  • The results of a one-way hash is a message digest
  • It provides authentication, message (Correct)

Answer : It provides authentication, message

Prolonged power supply, which is lower than the normal voltage is:


Options are :

  • blackout
  • wave
  • undervoltage (Correct)
  • fault
  • None

Answer : undervoltage

Which of the following can best be defined as cryptanalysis technique in which the analyst trying to figure out some key information about the plaintext-ciphertext pairs?


Options are :

  • Well-known-plaintext attack (Correct)
  • None
  • The chosen plaintext attack
  • The chosen-ciphertext attack
  • A well-known algorithm to attack

Answer : Well-known-plaintext attack

Ideal for action-humidity is defined as 40 percent to 60 percent. High humidity (above 60 percent), can produce the type of problem with your computer parts?


Options are :

  • None
  • Energy-coating
  • Static electricity
  • Element coating
  • Corrosion (Correct)

Answer : Corrosion

Examples of physical access control include all except which of the following?


Options are :

  • passwords (Correct)
  • None
  • rumblings
  • locks
  • security guards

Answer : passwords

CISSP - Security Operations Mock Questions

How doorway with automatic locks occupied now configured?


Options are :

  • It would be configured with security (Correct)
  • None
  • It should be a door delay cipher lock.
  • It would be configured to fail-safe.
  • It should not be allowed to piggyback.

Answer : It would be configured with security

Adjustments, such as guards and general guidance on maintaining the security of the building, security of server rooms or laptops, protection of cables and the use of magnetic switches on doors and windows are some examples:


Options are :

  • technical inspections.
  • logical control.
  • None
  • physical checks. (Correct)
  • administrative control.

Answer : physical checks.

Which of the following can best identify the key distribution protocol, which uses a hybrid encryption keys to pass the session? This protocol establishes a long-term key once, and then not require any prior communication, in order to create or change the key sessionby-session basis?


Options are :

  • Diffie-Hellman Key Distribution Protocol
  • Psec Key Exchange (IKE)
  • Simple Key-management of Internet Protocols (skip) (Correct)
  • Internet Security Association and Key Management Protocol (ISAKMP)
  • None

Answer : Simple Key-management of Internet Protocols (skip)

What can be best defined as the following key recovery technique for recording information on an encryption key by encrypting it with a key and ensures that only certain third parties to perform decryption operation the key to retrieve a saved?


Options are :

  • Zero-knowledge proof recovery
  • key escrow
  • None
  • fair cryptography
  • key encapsulation (Correct)

Answer : key encapsulation

Which of the following statements related to fire suppression systems is true?


Options are :

  • Halon is now the most common choice as far as materials are concerned, because it is a very effective way that it interferes with a chemical reaction within the elements of fire.
  • CO2 systems are not effective because they suppress the supply of oxygen needed to support the fire.
  • None
  • Gas masks provide effective protection for the use of CO2 systems. They are recommended for the protection of employees in data centers.
  • The water-based fire extinguishers are not effective suppression method class C (electrical) fires. (Correct)

Answer : The water-based fire extinguishers are not effective suppression method class C (electrical) fires.

Which of the following statements is most accurate regarding digital signature?


Options are :

  • It can be used as a signature system and encryption system
  • None
  • It is the art of the handwritten signature is transferred to electronic media
  • It is a method that is used to encrypt confidential information
  • It allows the recipient data to prove the source and integrity (Correct)

Answer : It allows the recipient data to prove the source and integrity

CISSP - Software Development Security Mock Questions

You have chosen to authenticate the source of initiating the transfer of a particular ensuring the integrity of the data being transferred. You can do this as follows:


Options are :

  • which the sender to encrypt his symmetric key.
  • the sender encrypts the hash with his private key (Correct)
  • with the sender's private key to encrypt her.
  • None
  • which the sender encrypts the hash of his public key.

Answer : the sender encrypts the hash with his private key

What allows users to confirm each other's certificates when they have been certified by various certification hierarchies?


Options are :

  • multiple certificates
  • cross-certification (Correct)
  • Root Certification Authorities
  • None
  • unnecessary certification authorities

Answer : cross-certification

Which of the following has been identified as a key establishment protocol based on the Diffie-Hellman key exchange algorithm proposed IPSec but was replaced by IKE?


Options are :

  • OAKLEY (Correct)
  • Simple Key-management of Internet Protocols (skip)
  • Diffie-Hellman protocol
  • Internet Security Association and Key Management Protocol (ISAKMP)
  • None

Answer : OAKLEY

Which of the following was developed to protect against fraud in electronic fund transfers (EFT) ensuring that the message comes from its claimed instigator and that it has not been modified transmission?


Options are :

  • Secure Electronic Transaction (SET)
  • Message Authentication Code (MAC) (Correct)
  • Cyclic Redundancy Check (CRC)
  • None
  • Secure Hash Standard (SHS)

Answer : Message Authentication Code (MAC)

Which of the following was not meant to be your own encryption algorithm?


Options are :

  • skipjack
  • blowfish (Correct)
  • RC2
  • None
  • RC4

Answer : blowfish

CISSP - Software Development Security Mock Questions

National Institute of Standards and Technology (NIST) standard for Protection of Natural Resources states that the critical areas should be illuminated up to?


Options are :

  • Illuminated nine feet high and at least two foot-candles
  • Illuminated nine feet high at least three foot-candles
  • Illuminated eight feet high and at least three foot-candles
  • Illuminated eight feet high and at least two foot-candles (Correct)
  • None

Answer : Illuminated eight feet high and at least two foot-candles

Which of the following is bound in the name of the public key value?


Options are :

  • The private key certificate
  • The public key certificate
  • Secret Key Infrastructure
  • None
  • Public key infrastructure (Correct)

Answer : Public key infrastructure

Which of the following encryption algorithms can not deal with the discrete logarithms of?


Options are :

  • RSA (Correct)
  • None
  • el Gamal
  • elliptic curve
  • Diffie-Hellman

Answer : RSA

Every fire class can irrigate most appropriate?


Options are :

  • Class C fires
  • Class D fires
  • None
  • Class A fires (Correct)
  • B fires

Answer : Class A fires

What can be defined as a digital certificate that binds a set of descriptive data items, with the exception of the public key, either directly for a name or identifier of another certificate, a public key certificate?


Options are :

  • An attribute certificate (Correct)
  • descriptive certificate
  • None
  • Digital certificate
  • The public key certificate

Answer : An attribute certificate

Which of the following provides the confidentiality of an e-mail message?


Options are :

  • The sender is encrypted with the recipient's public key. (Correct)
  • The sender encrypt the public key.
  • The sender is encrypted with the recipient's private key.
  • None
  • The sender by encrypting it with its private key.

Answer : The sender is encrypted with the recipient's public key.

CISSP - Security Operations Mock Questions

Which of the following is an Internet IPsec to negotiate, create, edit, and delete security associations, as well as change the key generation and authentication data independent of the details of any specific key-generation technology, the key to the establishment of a protocol, encryption algorithm, or authentication mechanism?


Options are :

  • Internet Security Association and Key Management Protocol (ISAKMP) (Correct)
  • IPsec Key Exchange (IKE)
  • None
  • Simple Key-management of Internet Protocols (skip)
  • OAKLEY

Answer : Internet Security Association and Key Management Protocol (ISAKMP)

In a client and server SSL session, which is responsible for producing a secret, which is used as a seed to generate symmetric keys that are used during the session?


Options are :

  • Both the client and server (Correct)
  • Dealer Certificate Server
  • the client browser
  • The web server
  • None

Answer : Both the client and server

Which of the following is not a one-way hashing algorithm?


Options are :

  • RC4 (Correct)
  • None
  • HAVAL
  • MD2
  • SHA-1

Answer : RC4

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions