100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CISSP - Cryptography Exam Questions And Answers $9.99   Add to cart

Exam (elaborations)

CISSP - Cryptography Exam Questions And Answers

 0 view  0 purchase
  • Course
  • CISSP - Cryptography
  • Institution
  • CISSP - Cryptography

CISSP - Cryptography Exam Questions And Answers...

Preview 2 out of 10  pages

  • November 1, 2024
  • 10
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CISSP - Cryptography
  • CISSP - Cryptography
avatar-seller
Easton
CISSP - Cryptography Exam Questions And Answers


What is cryptanalysis used for?

A. Its strength depends on the algorithm being used

B. Increasing substitution functions in a cryptographic algorithm

C. Decreasing transposition functions in a cryptographic algorithm

D. To determine the permutations used - Answer A. Cryptanalysis is the attempt to
reverse-engineer a cryptosystem, perhaps for the purpose of finding out what key was
used. When this key is discovered, then all the other messages that were encrypted with
this key will also be accessed. Cryptanalysis is done by the white hats in order to test
the robustness of the algorithm.



Successful brute force attacks are becoming more frequent due to

A. The use of permutations and transpositions are more in algorithms.

B. Stronger the algorithm lesser will be its complexity hence easier to be attacked.

C. Processor speed and power has increased.

D. Key length decreases with time. -Answer C. A Brute force attack is resource
intensive. It tries all values until the correct value is hit. Since computers keep getting
additional processors, the attacker can have much more powerful Brute force attacks.



What of the following is not a property or characteristic of a one-way hash function?

A. It takes a message of arbitrary length and generates a fixed-length value from this.

B. Given the value of the digest, it should be computationally infeasible to find the
message actually represented.

C. It must not be possible, or very rare, that two different messages generate the same
digest.

D. It changes a fixed length message to an arbitrary length value. -Answer D. A hashing
algorithm takes a string of variable length, the message can be of any size and
computes a fixed-length value. The fixed-length value is the message digest. The MD
family creates the fixed-length value of 128 bits and SHA creates one of 160 bits.

, What would be proof that a message has been changed?

A. The public key has been altered.

B. The private key has been altered.

C. The message digest has been altered

D. The message has been encrypted correctly. -Answer C. Hashing algorithms produce
message digests as a means to determine whether tampering has occurred. Both
originator and recipient generate their own digests independently. The recipient
compares these values. If they are different, the recipient knowsthe message has been
tampered with.



Which of the following is an algorithm developed by the U.S. Federal government to
produce secure message digests?

A. Data Encryption Algorithm

B. Digital Signature Standard

C. Secure Hash Algorithm

D. Data Signature Algorithm - Answer C. SHA was designed to produce secure message
digests. Digital Signature Standard, or DSS, the standard to generate digital signatures
mandates the use of SHA. DSS also specifies the digital signature algorithms that may
be used along with SHA: RSA, DSA and ECDSA.



What would be the best description of the difference between HMAC and CBC-MAC?

A. HMAC generates a message digest and is used to achieve integrity; CBC-MAC uses
the block cipher to encrypt blocks of data to achieve confidentiality.

B. HMAC uses a symmetric key and a hashing algorithm; CBC-MAC uses the first block
for the checksum.

C. HMAC: Integrity and data origin authentication; CBC-MAC: The block cipher used in
the process of creating a MAC.

D. HMAC encrypts a message with a symmetric key and then puts the result through a
hashing algorithm; CBC-MAC encrypts the whole message. - C. During an HMAC
operation, a message is concatenated to a symmetric key and the result put through a
hashing algorithm. The process provides integrity and system or data authentication.
CBC-MAC uses a block cipher to create a MAC,

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Easton. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

82191 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.99
  • (0)
  Add to cart