Page 417 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 417

Review Questions



                1.  How many possible keys exist in a 4-bit key space?

                    A.  4

                    B.  8

                    C.  16

                    D.  128

                2.  John recently received an email message from Bill. What
                    cryptographic goal would need to be met to convince John that Bill
                    was actually the sender of the message?


                    A.  Nonrepudiation

                    B.  Confidentiality

                    C.  Availability

                    D.  Integrity

                3.  What is the length of the cryptographic key used in the Data
                    Encryption Standard (DES) cryptosystem?

                    A.  56 bits

                    B.  128 bits


                    C.  192 bits
                    D.  256 bits


                4.  What type of cipher relies on changing the location of characters
                    within a message to achieve confidentiality?

                    A.  Stream cipher

                    B.  Transposition cipher

                    C.  Block cipher

                    D.  Substitution cipher

                5.  Which one of the following is not a possible key length for the
   412   413   414   415   416   417   418   419   420   421   422