Page 1527 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1527

this fixed-length output is a requirement of any secure hashing
                    algorithm.

                7.  C. The WEP algorithm has documented flaws that make it trivial to

                    break. It should never be used to protect wireless networks.

                8.  A. Wi-Fi Protected Access (WPA) uses the Temporal Key Integrity
                    Protocol (TKIP) to protect wireless communications. WPA2 uses
                    AES encryption.

                9.  B. Sue would have encrypted the message using Richard’s public
                    key. Therefore, Richard needs to use the complementary key in the

                    key pair, his private key, to decrypt the message.

              10.  B. Richard should encrypt the message digest with his own private
                    key. When Sue receives the message, she will decrypt the digest
                    with Richard’s public key and then compute the digest herself. If
                    the two digests match, she can be assured that the message truly
                    originated from Richard.

               11.  C. The Digital Signature Standard allows federal government use of
                    the Digital Signature Algorithm, RSA, or the Elliptic Curve DSA in

                    conjunction with the SHA-1 hashing function to produce secure
                    digital signatures.

               12.  B. X.509 governs digital certificates and the public-key
                    infrastructure (PKI). It defines the appropriate content for a digital
                    certificate and the processes used by certificate authorities to
                    generate and revoke certificates.

               13.  B. Pretty Good Privacy uses a “web of trust” system of digital

                    signature verification. The encryption technology is based on the
                    IDEA private key cryptosystem.

               14.  C. Transport Layer Security uses TCP port 443 for encrypted client-
                    server communications.

               15.  C. The meet-in-the-middle attack demonstrated that it took
                    relatively the same amount of computation power to defeat 2DES
                    as it does to defeat standard DES. This led to the adoption of Triple
                    DES (3DES) as a standard for government communication.


               16.  A. Rainbow tables contain precomputed hash values for commonly
   1522   1523   1524   1525   1526   1527   1528   1529   1530   1531   1532