Pass the ISC ISC 2 Credentials SSCP Questions and answers with CertsForce

Viewing page 8 out of 14 pages
Viewing questions 141-160 out of questions
Questions # 141:

Which of the following is not a property of the Rijndael block cipher algorithm?

Options:

A.

It employs a round transformation that is comprised of three layers of distinct and invertible transformations.


B.

It is suited for high speed chips with no area restrictions.


C.

It operates on 64-bit plaintext blocks and uses a 128 bit key.


D.

It could be used on a smart card.


Expert Solution
Questions # 142:

What is the main problem of the renewal of a root CA certificate?

Options:

A.

It requires key recovery of all end user keys


B.

It requires the authentic distribution of the new root CA certificate to all PKI participants


C.

It requires the collection of the old root CA certificates from all the users


D.

It requires issuance of the new root CA certificate


Expert Solution
Questions # 143:

Which of the following algorithms is used today for encryption in PGP?

Options:

A.

RSA


B.

IDEA


C.

Blowfish


D.

RC5


Expert Solution
Questions # 144:

Which of the following can best be defined as a key distribution protocol that uses hybrid encryption to convey session keys. This protocol establishes a long-term key once, and then requires no prior communication in order to establish or exchange keys on a session-by-session basis?

Options:

A.

Internet Security Association and Key Management Protocol (ISAKMP)


B.

Simple Key-management for Internet Protocols (SKIP)


C.

Diffie-Hellman Key Distribution Protocol


D.

IPsec Key exchange (IKE)


Expert Solution
Questions # 145:

The DES algorithm is an example of what type of cryptography?

Options:

A.

Secret Key


B.

Two-key


C.

Asymmetric Key


D.

Public Key


Expert Solution
Questions # 146:

Secure Sockets Layer (SSL) uses a Message Authentication Code (MAC) for what purpose?

Options:

A.

message non-repudiation.


B.

message confidentiality.


C.

message interleave checking.


D.

message integrity.


Expert Solution
Questions # 147:

In a SSL session between a client and a server, who is responsible for generating the master secret that will be used as a seed to generate the symmetric keys that will be used during the session?

Options:

A.

Both client and server


B.

The client's browser


C.

The web server


D.

The merchant's Certificate Server


Expert Solution
Questions # 148:

Which of the following can best define the "revocation request grace period"?

Options:

A.

The period of time allotted within which the user must make a revocation request upon a revocation reason


B.

Minimum response time for performing a revocation by the CA


C.

Maximum response time for performing a revocation by the CA


D.

Time period between the arrival of a revocation request and the publication of the revocation information


Expert Solution
Questions # 149:

Which of the following statements pertaining to message digests is incorrect?

Options:

A.

The original file cannot be created from the message digest.


B.

Two different files should not have the same message digest.


C.

The message digest should be calculated using at least 128 bytes of the file.


D.

Messages digests are usually of fixed size.


Expert Solution
Questions # 150:

Which of the following elements is NOT included in a Public Key Infrastructure (PKI)?

Options:

A.

Timestamping


B.

Repository


C.

Certificate revocation


D.

Internet Key Exchange (IKE)


Expert Solution
Questions # 151:

The Diffie-Hellman algorithm is primarily used to provide which of the following?

Options:

A.

Confidentiality


B.

Key Agreement


C.

Integrity


D.

Non-repudiation


Expert Solution
Questions # 152:

Which is NOT a suitable method for distributing certificate revocation information?

Options:

A.

CA revocation mailing list


B.

Delta CRL


C.

OCSP (online certificate status protocol)


D.

Distribution point CRL


Expert Solution
Questions # 153:

Which of the following algorithms is a stream cipher?

Options:

A.

RC2


B.

RC4


C.

RC5


D.

RC6


Expert Solution
Questions # 154:

Which of the following statements pertaining to key management is incorrect?

Options:

A.

The more a key is used, the shorter its lifetime should be.


B.

When not using the full keyspace, the key should be extremely random.


C.

Keys should be backed up or escrowed in case of emergencies.


D.

A key's lifetime should correspond with the sensitivity of the data it is protecting.


Expert Solution
Questions # 155:

Which protocol makes USE of an electronic wallet on a customer's PC and sends encrypted credit card information to merchant's Web server, which digitally signs it and sends it on to its processing bank?

Options:

A.

SSH ( Secure Shell)


B.

S/MIME (Secure MIME)


C.

SET (Secure Electronic Transaction)


D.

SSL (Secure Sockets Layer)


Expert Solution
Questions # 156:

The Diffie-Hellman algorithm is used for:

Options:

A.

Encryption


B.

Digital signature


C.

Key agreement


D.

Non-repudiation


Expert Solution
Questions # 157:

What does the directive of the European Union on Electronic Signatures deal with?

Options:

A.

Encryption of classified data


B.

Encryption of secret data


C.

Non repudiation


D.

Authentication of web servers


Expert Solution
Questions # 158:

Which of the following BEST describes a function relying on a shared secret key that is used along with a hashing algorithm to verify the integrity of the communication content as well as the sender?

Options:

A.

Message Authentication Code - MAC


B.

PAM - Pluggable Authentication Module


C.

NAM - Negative Acknowledgement Message


D.

Digital Signature Certificate


Expert Solution
Questions # 159:

How many bits is the effective length of the key of the Data Encryption Standard algorithm?

Options:

A.

168


B.

128


C.

56


D.

64


Expert Solution
Questions # 160:

Which of the following is NOT a known type of Message Authentication Code (MAC)?

Options:

A.

Keyed-hash message authentication code (HMAC)


B.

DES-CBC


C.

Signature-based MAC (SMAC)


D.

Universal Hashing Based MAC (UMAC)


Expert Solution
Viewing page 8 out of 14 pages
Viewing questions 141-160 out of questions