Page 1528 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1528
used passwords and may be used to increase the efficiency of
password cracking attacks.
17. C. The Wi-Fi Protected Access protocol encrypts traffic passing
between a mobile client and the wireless access point. It does not
provide end-to-end encryption.
18. B. Certificate revocation lists (CRLs) introduce an inherent latency
to the certificate expiration process due to the time lag between
CRL distributions.
19. D. The Merkle-Hellman Knapsack algorithm, which relies on the
difficulty of factoring super-increasing sets, has been broken by
cryptanalysts.
20. B. IPsec is a security protocol that defines a framework for setting
up a secure channel to exchange information between two entities.

