Page 419 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 419

10.  Which one of the following cipher types operates on large pieces of
                    a message rather than individual characters or bits of a message?

                    A.  Stream cipher


                    B.  Caesar cipher

                    C.  Block cipher

                    D.  ROT3 cipher

               11.  What is the minimum number of cryptographic keys required for
                    secure two-way communications in symmetric key cryptography?

                    A.  One

                    B.  Two

                    C.  Three

                    D.  Four

               12.  Dave is developing a key escrow system that requires multiple

                    people to retrieve a key but does not depend on every participant
                    being present. What type of technique is he using?

                    A.  Split knowledge

                    B.  M of N Control

                    C.  Work function

                    D.  Zero-knowledge proof

               13.  Which one of the following Data Encryption Standard (DES)
                    operating modes can be used for large messages with the assurance

                    that an error early in the encryption/decryption process won’t spoil
                    results throughout the communication?

                    A.  Cipher Block Chaining (CBC)

                    B.  Electronic Code Book (ECB)

                    C.  Cipher Feedback (CFB)

                    D.  Output feedback (OFB)

               14.  Many cryptographic algorithms rely on the difficulty of factoring
   414   415   416   417   418   419   420   421   422   423   424