Examen:
CISSP - (ISC)2 Certified Information Systems Security Professional - Chapter 07
Brian computes the digest of a single sentence of text using a SHA-2 hash function. He then changes a single character of the sentence and computes the hash value again.
1.-Which one of the following statements is true about the new hash value? A. The new hash value will be one character different from the old hash value. B. The new hash value will share at least 50 percent of the characters of the old hash value. C. The new hash value will be unchanged. D. The new hash value will be completely different from the old hash value.
Alan believes that an attacker is collecting information about the electricity consumption of a sensitive cryptographic device and using that information to compromise encrypted data.
2.-What type of attack does he suspect is taking place? A. Brute force B. Side channel C. Known plaintext D. Frequency analysis
3.-If Richard wants to send a confidential encrypted message to Sue using a public key cryptosystem, which key does he use to encrypt the message? A. Richards public key B. Richards private key C. Sues public key D. Sues private key
4.-If a 2,048-bit plaintext message were encrypted with the ElGamal public key cryptosystem, how long would the resulting ciphertext message be? A. 1,024 bits B. 2,048 bits C. 4,096 bits D. 8,192 bits
Acme Widgets currently uses a 3,072-bit RSA encryption standard companywide. The company plans to convert from RSA to an elliptic curve cryptosystem.
5.-If the company wants to maintain the same cryptographic strength, what ECC key length should it use? A. 256 bits B. 512 bits C. 1,024 bits D. 2,048 bits
John wants to produce a message digest of a 2,048-byte message he plans to send to Mary.
6.-If he uses the SHA-2 hashing algorithm, what is a possible size for the message digest generated? A. 160 bits B. 512 bits C. 1,024 bits D. 2,048 bits
After conducting a survey of encryption technologies used in her organization, Melissa suspects that some may be out of date and pose security risks.
7.-Which one of the following technologies is considered flawed and should no longer be used? A. SHA-3 B. TLS 1.2 C. IPsec D. SSL 3.0
You are developing an application that compares passwords to those stored in a Unix password file. The hash values you compute are not correctly matching those in the file.
8.-What might have been added to the stored password hashes? A. Salt B. Double hash C. Added encryption D. One-time pad
Richard received an encrypted message sent to him from Sue. Sue encrypted the message using the RSA encryption algorithm.
9.-Which key should Richard use to decrypt the message? A. Richards public key B. Richards private key C. Sues public key D. Sues private key
Richard wants to digitally sign a message hes sending to Sue so that Sue can be sure the message came from him without modification while in transit.
10.-Which key should he use to encrypt the message digest? A. Richards public key B. Richards private key C. Sues public key D. Sues private key
11.-Which one of the following algorithms is not supported by the Digital Signature Standard under FIPS 186-4? A. Digital Signature Algorithm B. RSA C. ElGamal DSA D. Elliptic Curve DSA
12.-Which International Telecommunications Union (ITU) standard governs the creation and endorsement of digital certificates for secure electronic communication? A. X.500 B. X.509 C. X.900 D. X.905
Ron believes that an attacker accessed a highly secure system in his data center and applied high-voltage electricity to it in an effort to compromise the cryptographic keys that it uses.
13.-What type of attack does he suspect? A. Implementation attack B. Fault injection C. Timing D. Chosen ciphertext
Brandon is analyzing network traffic and is searching for user attempts to access websites over secure TLS connections.
14.-What TCP port should Brandon add to his search filter because it would normally be used by this traffic? A. 22 B. 80 C. 443 D. 1443
Beth is assessing the vulnerability of a cryptographic system to attack. She believes that the cryptographic keys are properly secured and that the system is using a modern, secure algorithm.
15.-Which one of the following attacks would most likely still be possible against the system by an external attacker who did not participate in the system and did not have physical access to the facility? A. Ciphertext only B. Known plaintext C. Chosen plaintext D. Fault injection
Which of the following tools can be used to improve the effectiveness of a brute-force password cracking attack?
16.- A. Rainbow tables B. Hierarchical screening C. TKIP D. Random enhancement
Chris is searching a Windows system for binary key files and wishes to narrow his search using file extensions.
17.-Which one of the following certificate formats is closely associated with Windows binary certificate files? A. CCM B. PEM C. PFX D. P7B
18.-What is the major disadvantage of using certificate revocation lists? A. Key management B. Latency C. Record keeping D. Vulnerability to brute-force attacks
19.-Which one of the following encryption algorithms is now considered insecure? A. ElGamal B. RSA C. Elliptic Curve Cryptography D. MerkleHellman Knapsack
Brian is upgrading a system to support SSH2 rather than SSH1.
20.-Which one of the following advantages will he achieve? A. Support for multifactor authentication B. Support for simultaneous sessions C. Support for 3DES encryption D. Support for IDEA encryption