CISSP Security Engineering Certification Practice Exam Set 9

The equation used to calculate the total amount of the symmetric key (K) necessary for a particular group of users (N) to securely communicate with each other is obtained which of the following?


Options are :

  • N (K "1) / 2
  • Q (N + 1) / 2
  • N (N "1) / 2 (Correct)
  • None
  • K (n 1) / 2

Answer : N (N "1) / 2

When we encrypt or decrypt data which is based on the use of ones and zeros, where they are compared to a process that looks like this: 0101 0001 Plain Text 0111 0011 0010 0010 Output key stream What is the operation of this encryption is called?


Options are :

  • decryption
  • None
  • Exclusive-OR (Correct)
  • The logical-NOR
  • bit Shift

Answer : Exclusive-OR

Which of the following is not a feature of the Rijndael block cipher algorithm?


Options are :

  • It could be used as a smart card.
  • It uses a circular shift, which consists of three layers separate and reversible changes.
  • None
  • It is suitable for high speed chips without regional restrictions.
  • It works on 64-bit blocks, and uses a 128-bit key. (Correct)

Answer : It works on 64-bit blocks, and uses a 128-bit key.

CISSP - Mock Questions with all domains

The guards are always required for proper operation safety program includes which of the following?


Options are :

  • physical strength
  • None
  • Action Access control equipment
  • The need to detect unauthorized (Correct)
  • Use the discriminating judgment

Answer : The need to detect unauthorized

What attribute belongs X.509 certificate?


Options are :

  • key pair for the certificate holder
  • Telephone number of department
  • None
  • The unique name of the subject (Correct)
  • secret key of the issuing CA

Answer : The unique name of the subject

What is the maximum allowable key size Rijndael encryption algorithm?


Options are :

  • 512 bits
  • 128 bits
  • None
  • 256 bits (Correct)
  • 192 bits

Answer : 256 bits

DES algorithm is an example of what kind of cipher?


Options are :

  • asymmetric key
  • None
  • Two-key
  • the public key
  • secret key (Correct)

Answer : secret key

X.509 public key certificate with use of the key attribute "non-repudiation" can be used, which of the following?


Options are :

  • signing messages
  • None
  • check signed messages (Correct)
  • decrypt encrypted messages
  • encrypting messages

Answer : check signed messages

What is the name of the one way to change part of a string tend to be shorter value or key that represents the original string of fixed-length? Such a change can not be undone.


Options are :

  • into national
  • replacement
  • One-way hash (Correct)
  • D FLAT
  • None

Answer : One-way hash

CISSP - Security and Risk Management Pratice Questions

Critical areas should be lit:


Options are :

  • Eight feet high and four feet away.
  • None
  • Ten feet high and four feet away.
  • Eight feet high and two feet away. (Correct)
  • Ten feet tall and six feet away.

Answer : Eight feet high and two feet away.

Whatever you want to call a computer chip installed on the motherboard of modern computers and is dedicated to the implementation of the security features that require storage and processing of symmetric and asymmetric keys, seals, and digital certificates.


Options are :

  • An arithmetic logical unit (ALU)
  • BIOS Trusted Module (TBM)
  • None
  • Trusted Platform Module (TPM) (Correct)
  • Central Processing Unit (CPU)

Answer : Trusted Platform Module (TPM)

What type of encryption is considered to be unbreakable if the power is truly random and is equal to the plaintext and never again, in whole or in part?


Options are :

  • None
  • Once Cryptopad (OTC)
  • Pretty Good Privacy (PGP)
  • One Time Pad (OTP) (Correct)
  • Cryptanalysis

Answer : One Time Pad (OTP)

Which of the following types of encryption is used when both parties use the same key to securely communicate with each other?


Options are :

  • Diffie-Hellman
  • DSS - Digital Signature Standard
  • PKI - Public Key Infrastructure
  • Symmetric Key Cryptography (Correct)
  • None

Answer : Symmetric Key Cryptography

Which of the following is TRUE about the link encryption?


Options are :

  • This mode does not protect someone if the nodes along the transmission path is compromised. (Correct)
  • Only safe nodes used for this type of transmission
  • Each unit has a common key to the destination node
  • Encrypted messages unloaded until the final knot.
  • None

Answer : This mode does not protect someone if the nodes along the transmission path is compromised.

Secure Sockets Layer (SSL) to use Message Authentication Code (MAC) for what purpose?


Options are :

  • interleave your message checking.
  • Message repudiation.
  • message integrity (Correct)
  • Message confidentiality
  • None

Answer : message integrity

CISSP - Communications and Network Security Mock Questions

Which of the following is NOT a symmetrical encryption?


Options are :

  • blowfish (Correct)
  • Digital Signature Standard (DSS)
  • Triple DES (3DES)
  • RC5
  • None

Answer : blowfish

Which of the following best protocols to mitigate the threats of attacks sniffer network application traffic?


Options are :

  • SSL or TLS (Correct)
  • SSH - Secure Shell
  • None
  • 802.1X
  • ARP Cache Security

Answer : SSL or TLS

What is the maximum number of different keys that can be used when encrypted using Triple DES?


Options are :

  • 2
  • 3 (Correct)
  • 4
  • None
  • 1

Answer : 3

Ideal for action-humidity is defined as 40 percent to 60 percent. Low humidity (less than 40 per cent) can produce what kind of a problem for computer components?


Options are :

  • Element coating
  • Static electricity (Correct)
  • Energy-coating
  • None
  • electroplating

Answer : Static electricity

Which of the following is TRUE about digital certificate?


Options are :

  • It is the same as the digital signature proving the integrity and authenticity of data
  • You can only get a digital certificate from VeriSign, RSA, if you want to prove the key belongs to a particular user.
  • None
  • Electronic credential certifying that the person has been granted a certificate is who they claim to be. (Correct)
  • It may contain information about the geography, such as ground for example.

Answer : Electronic credential certifying that the person has been granted a certificate is who they claim to be.

Which is not a suitable method for dividing a certificate has not been revoked information?


Options are :

  • CA Canceling a mailing list (Correct)
  • None
  • Delta CRLs
  • CRL Distribution Point
  • OCSP (online certificate status protocol courses)

Answer : CA Canceling a mailing list

CISSP Security Engineering Certification Practical Exam Set 1

Diffie-Hellman algorithm is used mainly to which of the following?


Options are :

  • key agreement protocols (Correct)
  • integrity
  • confidence
  • Non-repudiation
  • None

Answer : key agreement protocols

What is the biggest problem of renewal of a root CA certificate?


Options are :

  • It requires a genuine distribution of the new root CA certificate to all participants PKI (Correct)
  • It requires the collection of old root CA certificates for all users
  • It requires giving a new root CA certificate
  • None
  • It requires a recovery key to all end-user keys

Answer : It requires a genuine distribution of the new root CA certificate to all participants PKI

Sentence. The message can be encrypted, which provides:


Options are :

  • Authentication.
  • confidence.
  • confidence.
  • integrity. (Correct)
  • None

Answer : integrity.

To be read is unreadable only plain text is:


Options are :

  • text Unplain
  • encryption
  • digitally signed
  • None
  • cipher text (Correct)

Answer : cipher text

Which of the following issues is less likely to help evaluate physical access control?


Options are :

  • Visitors to sensitive areas of the signed and escort?
  • Is the operating system configured to prevent the circumvention of security software and control applications? (Correct)
  • Are the keys or other terminal devices needed to write a computer room and a media library?
  • Is the management regularly reviews the list of sensitive sports facilities?
  • None

Answer : Is the operating system configured to prevent the circumvention of security software and control applications?

The environment, which must be protected includes all personnel, equipment, data communications equipment, power supply and wiring. the level of protection required depends on the value of the company's computer systems and data assets within the facility. The value of these items can be determined what type of analysis?


Options are :

  • Critical analysis of the channel
  • Critical-channel analysis
  • Critical path analysis (Correct)
  • None
  • The encrypted channel analysis

Answer : Critical path analysis

CISSP Security Engineering Certification Practical Exam Set 2

What is best defined as "the revocation request grace period" of the following?


Options are :

  • Period, the time during which the user must make the revocation request when the reason for the cancellation
  • The time between the arrival of the revocation request and the cancellation of the publication of information
  • Maximum withdrawn its response time to perform CA (Correct)
  • Minimum response time withdrawn to perform CA
  • None

Answer : Maximum withdrawn its response time to perform CA

Which of the following encryption methods are known to be unbreakable?


Options are :

  • Symmetric encryption.
  • None
  • DES code books
  • One-time pads. (Correct)
  • Elliptic Curve Cryptography.

Answer : One-time pads.

There are similarities between the trust models for Kerberos and Public Key Infrastructure (PKI). When we compare them side by side, Kerberos tickets, mainly responsible for which of the following?


Options are :

  • private keys
  • The public key certificates (Correct)
  • private-key certificates
  • None
  • public keys

Answer : The public key certificates

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions