Page 481 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 481
C. Client to wireless access point
D. Wireless access point to router
18. What is the major disadvantage of using certificate revocation
lists?
A. Key management
B. Latency
C. Record keeping
D. Vulnerability to brute-force attacks
19. Which one of the following encryption algorithms is now
considered insecure?
A. El Gamal
B. RSA
C. Elliptic Curve Cryptography
D. Merkle-Hellman Knapsack
20. What does IPsec define?
A. All possible security classifications for a specific configuration
B. A framework for setting up a secure communication channel
C. The valid transition states in the Biba model
D. TCSEC security categories

