Page 420 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 420

the product of large prime numbers. What characteristic of this
                    problem are they relying on?

                    A.  It contains diffusion.


                    B.  It contains confusion.

                    C.  It is a one-way function.

                    D.  It complies with Kerchoff’s principle.

               15.  How many keys are required to fully implement a symmetric
                    algorithm with 10 participants?

                    A.  10

                    B.  20

                    C.  45

                    D.  100

               16.  What block size is used by the Advanced Encryption Standard?


                    A.  32 bits

                    B.  64 bits

                    C.  128 bits

                    D.  Variable

               17.  What kind of attack makes the Caesar cipher virtually unusable?

                    A.  Meet-in-the-middle attack

                    B.  Escrow attack

                    C.  Frequency analysis attack

                    D.  Transposition attack


              18.  What type of cryptosystem commonly makes use of a passage from
                    a well-known book for the encryption key?

                    A.  Vernam cipher

                    B.  Running key cipher

                    C.  Skipjack cipher
   415   416   417   418   419   420   421   422   423   424   425