Page 417 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 417
Review Questions
1. How many possible keys exist in a 4-bit key space?
A. 4
B. 8
C. 16
D. 128
2. John recently received an email message from Bill. What
cryptographic goal would need to be met to convince John that Bill
was actually the sender of the message?
A. Nonrepudiation
B. Confidentiality
C. Availability
D. Integrity
3. What is the length of the cryptographic key used in the Data
Encryption Standard (DES) cryptosystem?
A. 56 bits
B. 128 bits
C. 192 bits
D. 256 bits
4. What type of cipher relies on changing the location of characters
within a message to achieve confidentiality?
A. Stream cipher
B. Transposition cipher
C. Block cipher
D. Substitution cipher
5. Which one of the following is not a possible key length for the

