Pass the ISC ISC 2 Credentials SSCP Questions and answers with CertsForce

Viewing page 9 out of 14 pages
Viewing questions 161-180 out of questions
Questions # 161:

Which of the following identifies the encryption algorithm selected by NIST for the new Advanced Encryption Standard?

Options:

A.

Twofish


B.

Serpent


C.

RC6


D.

Rijndael


Expert Solution
Questions # 162:

Which of the following is not a disadvantage of symmetric cryptography when compared with Asymmetric Ciphers?

Options:

A.

Provides Limited security services


B.

Has no built in Key distribution


C.

Speed


D.

Large number of keys are needed


Expert Solution
Questions # 163:

Which of the following was not designed to be a proprietary encryption algorithm?

Options:

A.

RC2


B.

RC4


C.

Blowfish


D.

Skipjack


Expert Solution
Questions # 164:

Which of the following ciphers is a subset on which the Vigenere polyalphabetic cipher was based on?

Options:

A.

Caesar


B.

The Jefferson disks


C.

Enigma


D.

SIGABA


Expert Solution
Questions # 165:

What is the key size of the International Data Encryption Algorithm (IDEA)?

Options:

A.

64 bits


B.

128 bits


C.

160 bits


D.

192 bits


Expert Solution
Questions # 166:

Which of the following is defined as an Internet, IPsec, key-establishment protocol, partly based on OAKLEY, that is intended for putting in place authenticated keying material for use with ISAKMP and for other security associations?

Options:

A.

Internet Key exchange (IKE)


B.

Security Association Authentication Protocol (SAAP)


C.

Simple Key-management for Internet Protocols (SKIP)


D.

Key Exchange Algorithm (KEA)


Expert Solution
Questions # 167:

Kerberos depends upon what encryption method?

Options:

A.

Public Key cryptography.


B.

Secret Key cryptography.


C.

El Gamal cryptography.


D.

Blowfish cryptography.


Expert Solution
Questions # 168:

In a hierarchical PKI the highest CA is regularly called Root CA, it is also referred to by which one of the following term?

Options:

A.

Subordinate CA


B.

Top Level CA


C.

Big CA


D.

Master CA


Expert Solution
Questions # 169:

Which type of algorithm is considered to have the highest strength per bit of key length of any of the asymmetric algorithms?

Options:

A.

Rivest, Shamir, Adleman (RSA)


B.

El Gamal


C.

Elliptic Curve Cryptography (ECC)


D.

Advanced Encryption Standard (AES)


Expert Solution
Questions # 170:

Which of the following ASYMMETRIC encryption algorithms is based on the difficulty of FACTORING LARGE NUMBERS?

Options:

A.

El Gamal


B.

Elliptic Curve Cryptosystems (ECCs)


C.

RSA


D.

International Data Encryption Algorithm (IDEA)


Expert Solution
Questions # 171:

What is a characteristic of using the Electronic Code Book mode of DES encryption?

Options:

A.

A given block of plaintext and a given key will always produce the same ciphertext.


B.

Repetitive encryption obscures any repeated patterns that may have been present in the plaintext.


C.

Individual characters are encoded by combining output from earlier encryption routines with plaintext.


D.

The previous DES output is used as input.


Expert Solution
Questions # 172:

Which of the following is a cryptographic protocol and infrastructure developed to send encrypted credit card numbers over the Internet?

Options:

A.

Secure Electronic Transaction (SET)


B.

MONDEX


C.

Secure Shell (SSH-2)


D.

Secure Hypertext Transfer Protocol (S-HTTP)


Expert Solution
Questions # 173:

What is the primary role of cross certification?

Options:

A.

Creating trust between different PKIs


B.

Build an overall PKI hierarchy


C.

set up direct trust to a second root CA


D.

Prevent the nullification of user certificates by CA certificate revocation


Expert Solution
Questions # 174:

What key size is used by the Clipper Chip?

Options:

A.

40 bits


B.

56 bits


C.

64 bits


D.

80 bits


Expert Solution
Questions # 175:

What are the three most important functions that Digital Signatures perform?

Options:

A.

Integrity, Confidentiality and Authorization


B.

Integrity, Authentication and Nonrepudiation


C.

Authorization, Authentication and Nonrepudiation


D.

Authorization, Detection and Accountability


Expert Solution
Questions # 176:

Which of the following can best be defined as a cryptanalysis technique in which the analyst tries to determine the key from knowledge of some plaintext-ciphertext pairs?

Options:

A.

A known-plaintext attack


B.

A known-algorithm attack


C.

A chosen-ciphertext attack


D.

A chosen-plaintext attack


Expert Solution
Questions # 177:

What can be defined as secret communications where the very existence of the message is hidden?

Options:

A.

Clustering


B.

Steganography


C.

Cryptology


D.

Vernam cipher


Expert Solution
Questions # 178:

Where parties do not have a shared secret and large quantities of sensitive information must be passed, the most efficient means of transferring information is to use Hybrid Encryption Methods. What does this mean?

Options:

A.

Use of public key encryption to secure a secret key, and message encryption using the secret key.


B.

Use of the recipient's public key for encryption and decryption based on the recipient's private key.


C.

Use of software encryption assisted by a hardware encryption accelerator.


D.

Use of elliptic curve encryption.


Expert Solution
Questions # 179:

A X.509 public key certificate with the key usage attribute "non repudiation" can be used for which of the following?

Options:

A.

encrypting messages


B.

signing messages


C.

verifying signed messages


D.

decrypt encrypted messages


Expert Solution
Questions # 180:

Which of the following statements pertaining to stream ciphers is correct?

Options:

A.

A stream cipher is a type of asymmetric encryption algorithm.


B.

A stream cipher generates what is called a keystream.


C.

A stream cipher is slower than a block cipher.


D.

A stream cipher is not appropriate for hardware-based encryption.


Expert Solution
Viewing page 9 out of 14 pages
Viewing questions 161-180 out of questions