Page 479 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 479

9.  Richard received an encrypted message sent to him from Sue.
                    Which key should he use to decrypt the message?

                    A.  Richard’s public key


                    B.  Richard’s private key

                    C.  Sue’s public key

                    D.  Sue’s private key

              10.  Richard wants to digitally sign a message he’s sending to Sue so
                    that Sue can be sure the message came from him without
                    modification while in transit. Which key should he use to encrypt
                    the message digest?

                    A.  Richard’s public key


                    B.  Richard’s private key

                    C.  Sue’s public key

                    D.  Sue’s private key

               11.  Which one of the following algorithms is not supported by the
                    Digital Signature Standard?

                    A.  Digital Signature Algorithm

                    B.  RSA

                    C.  El Gamal DSA

                    D.  Elliptic Curve DSA

               12.  Which International Telecommunications Union (ITU) standard

                    governs the creation and endorsement of digital certificates for
                    secure electronic communication?

                    A.  X.500

                    B.  X.509

                    C.  X.900

                    D.  X.905

               13.  What cryptosystem provides the encryption/decryption technology
   474   475   476   477   478   479   480   481   482   483   484