Page 421 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 421

D.  Twofish cipher

               19.  Which AES finalist makes use of prewhitening and postwhitening
                    techniques?


                    A.  Rijndael

                    B.  Twofish

                    C.  Blowfish

                    D.  Skipjack

              20.  How many encryption keys are required to fully implement an
                    asymmetric algorithm with 10 participants?

                    A.  10

                    B.  20

                    C.  45

                    D.  100
   416   417   418   419   420   421   422   423   424   425   426