Page 477 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 477

Review Questions



                1.  In the RSA public key cryptosystem, which one of the following
                    numbers will always be largest?

                    A.  e

                    B.  n

                    C.  p

                    D.  q

                2.  Which cryptographic algorithm forms the basis of the El Gamal
                    cryptosystem?


                    A.  RSA

                    B.  Diffie-Hellman

                    C.  3DES

                    D.  IDEA

                3.  If Richard wants to send an encrypted message to Sue using a
                    public key cryptosystem, which key does he use to encrypt the
                    message?

                    A.  Richard’s public key

                    B.  Richard’s private key


                    C.  Sue’s public key

                    D.  Sue’s private key

                4.  If a 2,048-bit plaintext message were encrypted with the El Gamal
                    public key cryptosystem, how long would the resulting ciphertext
                    message be?

                    A.  1,024 bits

                    B.  2,048 bits

                    C.  4,096 bits
   472   473   474   475   476   477   478   479   480   481   482