Page 480 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 480
for the commercial version of Phil Zimmerman’s Pretty Good
Privacy secure email system?
A. ROT13
B. IDEA
C. ECC
D. El Gamal
14. What TCP/IP communications port is used by Transport Layer
Security traffic?
A. 80
B. 220
C. 443
D. 559
15. What type of cryptographic attack rendered Double DES (2DES)
no more effective than standard DES encryption?
A. Birthday attack
B. Chosen ciphertext attack
C. Meet-in-the-middle attack
D. Man-in-the-middle attack
16. Which of the following tools can be used to improve the
effectiveness of a brute-force password cracking attack?
A. Rainbow tables
B. Hierarchical screening
C. TKIP
D. Random enhancement
17. Which of the following links would be protected by WPA
encryption?
A. Firewall to firewall
B. Router to firewall

