Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ISC SSCP - Systems Security Certified Practitioner

Page: 2 / 14
Total 1074 questions

What is the name of a one way transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string? Such a transformation cannot be reversed?

A.

One-way hash

B.

DES

C.

Transposition

D.

Substitution

This type of attack is generally most applicable to public-key cryptosystems, what type of attack am I ?

A.

Chosen-Ciphertext attack

B.

Ciphertext-only attack

C.

Plaintext Only Attack

D.

Adaptive-Chosen-Plaintext attack

Which of the following ASYMMETRIC encryption algorithms is based on the difficulty of FACTORING LARGE NUMBERS?

A.

El Gamal

B.

Elliptic Curve Cryptosystems (ECCs)

C.

RSA

D.

International Data Encryption Algorithm (IDEA)

Which of the following offers security to wireless communications?

A.

S-WAP

B.

WTLS

C.

WSP

D.

WDP

What is used to bind a document to its creation at a particular time?

A.

Network Time Protocol (NTP)

B.

Digital Signature

C.

Digital Timestamp

D.

Certification Authority (CA)

What can be defined as a data structure that enumerates digital certificates that were issued to CAs but have been invalidated by their issuer prior to when they were scheduled to expire?

A.

Certificate revocation list

B.

Certificate revocation tree

C.

Authority revocation list

D.

Untrusted certificate list

Which of the following statements pertaining to link encryption is false?

A.

It encrypts all the data along a specific communication path.

B.

It provides protection against packet sniffers and eavesdroppers.

C.

Information stays encrypted from one end of its journey to the other.

D.

User information, header, trailers, addresses and routing data that are part of the packets are encrypted.

A one-way hash provides which of the following?

A.

Confidentiality

B.

Availability

C.

Integrity

D.

Authentication

Which of the following can best define the "revocation request grace period"?

A.

The period of time allotted within which the user must make a revocation request upon a revocation reason

B.

Minimum response time for performing a revocation by the CA

C.

Maximum response time for performing a revocation by the CA

D.

Time period between the arrival of a revocation request and the publication of the revocation information

Brute force attacks against encryption keys have increased in potency because of increased computing power. Which of the following is often considered a good protection against the brute force cryptography attack?

A.

The use of good key generators.

B.

The use of session keys.

C.

Nothing can defend you against a brute force crypto key attack.

D.

Algorithms that are immune to brute force key attacks.

The RSA algorithm is an example of what type of cryptography?

A.

Asymmetric Key.

B.

Symmetric Key.

C.

Secret Key.

D.

Private Key.

What can be defined as secret communications where the very existence of the message is hidden?

A.

Clustering

B.

Steganography

C.

Cryptology

D.

Vernam cipher

What does the directive of the European Union on Electronic Signatures deal with?

A.

Encryption of classified data

B.

Encryption of secret data

C.

Non repudiation

D.

Authentication of web servers

Which of the following is not a disadvantage of symmetric cryptography when compared with Asymmetric Ciphers?

A.

Provides Limited security services

B.

Has no built in Key distribution

C.

Speed

D.

Large number of keys are needed

What is the maximum allowable key size of the Rijndael encryption algorithm?

A.

128 bits

B.

192 bits

C.

256 bits

D.

512 bits

Which of the following offers confidentiality to an e-mail message?

A.

The sender encrypting it with its private key.

B.

The sender encrypting it with its public key.

C.

The sender encrypting it with the receiver's public key.

D.

The sender encrypting it with the receiver's private key.

A public key algorithm that does both encryption and digital signature is which of the following?

A.

RSA

B.

DES

C.

IDEA

D.

Diffie-Hellman

Which of the following algorithms does NOT provide hashing?

A.

SHA-1

B.

MD2

C.

RC4

D.

MD5

The DES algorithm is an example of what type of cryptography?

A.

Secret Key

B.

Two-key

C.

Asymmetric Key

D.

Public Key

What attribute is included in a X.509-certificate?

A.

Distinguished name of the subject

B.

Telephone number of the department

C.

secret key of the issuing CA

D.

the key pair of the certificate holder