Page 481 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 481

C.  Client to wireless access point

                    D.  Wireless access point to router

              18.  What is the major disadvantage of using certificate revocation
                    lists?


                    A.  Key management

                    B.  Latency

                    C.  Record keeping

                    D.  Vulnerability to brute-force attacks

               19.  Which one of the following encryption algorithms is now
                    considered insecure?

                    A.  El Gamal

                    B.  RSA


                    C.  Elliptic Curve Cryptography
                    D.  Merkle-Hellman Knapsack


              20.  What does IPsec define?

                    A.  All possible security classifications for a specific configuration

                    B.  A framework for setting up a secure communication channel

                    C.  The valid transition states in the Biba model

                    D.  TCSEC security categories
   476   477   478   479   480   481   482   483   484   485   486