HOME - HOME EXAMENES

Examen:

CISSP - (ISC)2 Certified Information Systems Security Professional - Chapter 07

Brian computes the digest of a single sentence of text using a SHA-2 hash function. He then changes a single character of the sentence and computes the hash value again.


1.-Which one of the following statements is true about the new hash value?
A. The new hash value will be one character different from the old hash value.
B. The new hash value will share at least 50 percent of the characters of the old hash value.
C. The new hash value will be unchanged.
D. The new hash value will be completely different from the old hash value.

Alan believes that an attacker is collecting information about the electricity consumption of a sensitive cryptographic device and using that information to compromise encrypted data.


2.-What type of attack does he suspect is taking place?
A. Brute force
B. Side channel
C. Known plaintext
D. Frequency analysis



3.-If Richard wants to send a confidential encrypted message to Sue using a public key cryptosystem, which key does he use to encrypt the message?
A. Richard’s public key
B. Richard’s private key
C. Sue’s public key
D. Sue’s private key



4.-If a 2,048-bit plaintext message were encrypted with the ElGamal public key cryptosystem, how long would the resulting ciphertext message be?
A. 1,024 bits
B. 2,048 bits
C. 4,096 bits
D. 8,192 bits

Acme Widgets currently uses a 3,072-bit RSA encryption standard companywide. The company plans to convert from RSA to an elliptic curve cryptosystem.


5.-If the company wants to maintain the same cryptographic strength, what ECC key length should it use?
A. 256 bits
B. 512 bits
C. 1,024 bits
D. 2,048 bits

John wants to produce a message digest of a 2,048-byte message he plans to send to Mary.


6.-If he uses the SHA-2 hashing algorithm, what is a possible size for the message digest generated?
A. 160 bits
B. 512 bits
C. 1,024 bits
D. 2,048 bits

After conducting a survey of encryption technologies used in her organization, Melissa suspects that some may be out of date and pose security risks.


7.-Which one of the following technologies is considered flawed and should no longer be used?
A. SHA-3
B. TLS 1.2
C. IPsec
D. SSL 3.0

You are developing an application that compares passwords to those stored in a Unix password file. The hash values you compute are not correctly matching those in the file.


8.-What might have been added to the stored password hashes?
A. Salt
B. Double hash
C. Added encryption
D. One-time pad

Richard received an encrypted message sent to him from Sue. Sue encrypted the message using the RSA encryption algorithm.


9.-Which key should Richard use to decrypt the message?
A. Richard’s public key
B. Richard’s private key
C. Sue’s public key
D. Sue’s private key

Richard wants to digitally sign a message he’s sending to Sue so that Sue can be sure the message came from him without modification while in transit.


10.-Which key should he use to encrypt the message digest?
A. Richard’s public key
B. Richard’s private key
C. Sue’s public key
D. Sue’s private key



11.-Which one of the following algorithms is not supported by the Digital Signature Standard under FIPS 186-4?
A. Digital Signature Algorithm
B. RSA
C. ElGamal DSA
D. Elliptic Curve DSA



12.-Which International Telecommunications Union (ITU) standard governs the creation and endorsement of digital certificates for secure electronic communication?
A. X.500
B. X.509
C. X.900
D. X.905

Ron believes that an attacker accessed a highly secure system in his data center and applied high-voltage electricity to it in an effort to compromise the cryptographic keys that it uses.


13.-What type of attack does he suspect?
A. Implementation attack
B. Fault injection
C. Timing
D. Chosen ciphertext

Brandon is analyzing network traffic and is searching for user attempts to access websites over secure TLS connections.


14.-What TCP port should Brandon add to his search filter because it would normally be used by this traffic?
A. 22
B. 80
C. 443
D. 1443

Beth is assessing the vulnerability of a cryptographic system to attack. She believes that the cryptographic keys are properly secured and that the system is using a modern, secure algorithm.


15.-Which one of the following attacks would most likely still be possible against the system by an external attacker who did not participate in the system and did not have physical access to the facility?
A. Ciphertext only
B. Known plaintext
C. Chosen plaintext
D. Fault injection

Which of the following tools can be used to improve the effectiveness of a brute-force password cracking attack?


16.-
A. Rainbow tables
B. Hierarchical screening
C. TKIP
D. Random enhancement

Chris is searching a Windows system for binary key files and wishes to narrow his search using file extensions.


17.-Which one of the following certificate formats is closely associated with Windows binary certificate files?
A. CCM
B. PEM
C. PFX
D. P7B



18.-What is the major disadvantage of using certificate revocation lists?
A. Key management
B. Latency
C. Record keeping
D. Vulnerability to brute-force attacks



19.-Which one of the following encryption algorithms is now considered insecure?
A. ElGamal
B. RSA
C. Elliptic Curve Cryptography
D. Merkle–Hellman Knapsack

Brian is upgrading a system to support SSH2 rather than SSH1.


20.-Which one of the following advantages will he achieve?
A. Support for multifactor authentication
B. Support for simultaneous sessions
C. Support for 3DES encryption
D. Support for IDEA encryption