Page 1528 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1528

used passwords and may be used to increase the efficiency of
                    password cracking attacks.

               17.  C. The Wi-Fi Protected Access protocol encrypts traffic passing

                    between a mobile client and the wireless access point. It does not
                    provide end-to-end encryption.

              18.  B. Certificate revocation lists (CRLs) introduce an inherent latency
                    to the certificate expiration process due to the time lag between
                    CRL distributions.

               19.  D. The Merkle-Hellman Knapsack algorithm, which relies on the

                    difficulty of factoring super-increasing sets, has been broken by
                    cryptanalysts.

              20.  B. IPsec is a security protocol that defines a framework for setting
                    up a secure channel to exchange information between two entities.
   1523   1524   1525   1526   1527   1528   1529   1530   1531   1532   1533