Page 480 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 480

for the commercial version of Phil Zimmerman’s Pretty Good
                    Privacy secure email system?

                    A.  ROT13


                    B.  IDEA

                    C.  ECC

                    D.  El Gamal

               14.  What TCP/IP communications port is used by Transport Layer
                    Security traffic?

                    A.  80

                    B.  220

                    C.  443

                    D.  559

               15.  What type of cryptographic attack rendered Double DES (2DES)

                    no more effective than standard DES encryption?

                    A.  Birthday attack

                    B.  Chosen ciphertext attack

                    C.  Meet-in-the-middle attack

                    D.  Man-in-the-middle attack

               16.  Which of the following tools can be used to improve the
                    effectiveness of a brute-force password cracking attack?

                    A.  Rainbow tables

                    B.  Hierarchical screening


                    C.  TKIP

                    D.  Random enhancement

               17.  Which of the following links would be protected by WPA
                    encryption?

                    A.  Firewall to firewall

                    B.  Router to firewall
   475   476   477   478   479   480   481   482   483   484   485