【计算机类职业资格】CISSP认证考试(密码学)-试卷1及答案解析.doc
《【计算机类职业资格】CISSP认证考试(密码学)-试卷1及答案解析.doc》由会员分享,可在线阅读,更多相关《【计算机类职业资格】CISSP认证考试(密码学)-试卷1及答案解析.doc(18页珍藏版)》请在麦多课文档分享上搜索。
1、CISSP 认证考试(密码学)-试卷 1 及答案解析(总分:60.00,做题时间:90 分钟)1.There are several components involved with steganography. Which of the following refers to a file that has hidden information in it?(分数:2.00)A.Stego-mediumB.Concealment cipherC.CarrierD.Payload2.Which of the following correctly describes the relations
2、hip between SSL and TLS?(分数:2.00)A.TLS is the open-community version of SSL.B.SSL can be modified by developers to expand the protocols capabilities.C.TLS is a proprietary protocol, while SSL is an open-community protocol.D.SSL is more extensible and backward compatible with TLS.3.Which of the follo
3、wing incorrectly describes steganography?(分数:2.00)A.It is a type of security through obscurity.B.Modifying the most significant bit is the most common method used.C.Steganography does not draw attention to itself like encryption does.D.Media files are ideal for steganographic transmission because of
4、 their large size.4.Which of the following correctly describes a drawback of symmetric key systems?(分数:2.00)A.Computationally less intensive than asymmetric systemsB.Work much more slowly than asymmetric systemsC.Carry out mathematically intensive tasksD.Key must be delivered via secure courier5.Whi
5、ch of the following occurs in a PK.I environment?(分数:2.00)A.The RA creates the certificate, and the CA signs it.B.The CA signs the certificate.C.The RA signs the certificate.D.The user signs the certificate.6.Encryption can happen at different layers of an operating system and network stack. Where d
6、oes PPTP encryption take place?(分数:2.00)A.Data link layerB.Within applicationsC.Transport layerD.Data link and physical layers7.Which of the following correctly describes the difference between public key cryptography and public key infrastructure?(分数:2.00)A.Public key cryptography is the use of an
7、asymmetric algorithm, while public key infrastructure is the use of a symmetric algorithm.B.Public key cryptography is used to create public/private key pairs, and public key infrastructure is used to perform key exchange and agreement.C.Public key cryptography provides authentication and nonrepudia
8、tion, while public key infrastructure provides confidentiality and integrity.D.Public key cryptography is another name for asymmetric cryptography, while public key infrastructure consists of public key cryptographic mechanisms.8.Which of the following best describes Key Derivation Functions (KDFs)?
9、(分数:2.00)A.Keys are generated from a master key.B.Session keys are generated from each other.C.Asymmetric cryptography is used to encrypt symmetric keys.D.A master key is generated from a session key.9.An elliptic curve cryptosystem is an asymmetric algorithm. What sets it apart from other asymmetri
10、c algorithms?(分数:2.00)A.It provides digital signatures, secure key distribution, and encryption.B.It computes discrete logarithms in a finite field.C.It uses a larger percentage of resources to carry out encryption.D.It is more efficient.10.If implemented properly, a one-time pad is a perfect encryp
11、tion scheme. Which of the following incorrectly describes a requirement for implementation?(分数:2.00)A.The pad must be securely distributed and protected at its destination.B.The pad must be made up of truly random values.C.The pad must always be the same length.D.The pad must be used only one time.1
12、1.Sally is responsible for key management within her organization. Which of the following incorrectly describes a principle of secure key management?(分数:2.00)A.Keys should be backed up or escrowed in case of emergencies.B.The more a key is used, the shorter its lifetime should be.C.Less secure data
13、allows for a shorter key lifetime.D.Keys should be stored and transmitted by secure means.12.Mandy needs to calculate how many keys must be generated for the 260 employees using the companys PKI asymmetric algorithm. How many keys are required?(分数:2.00)A.33,670B.520C.67340D.26013.Which of the follow
14、ing works similarly to stream ciphers?(分数:2.00)A.One-time padB.AESC.BlockD.RSA14.There are two main types of symmetric ciphers: stream and block. Which of the following is not an attribute of a good stream cipher?(分数:2.00)A.Statistically unbiased keystreamB.Statistically predictableC.Long periods of
15、 no repeating patternsD.Keystream not linearly related to key15.Which of the following best describes how a digital signature is created?(分数:2.00)A.The sender encrypts a message digest with his private key.B.The sender encrypts a message digest with his public key.C.The receiver encrypts a message d
16、igest with his private key.D.The receiver encrypts a message digest with his public key.16.In cryptography, different steps and algorithms provide different types of security services. Which of the following provides only authentication, nonrepudiation, and integrity?(分数:2.00)A.Encryption algorithmB
17、.Hash algorithmC.Digital signatureD.Encryption paired with a digital signature17.Advanced Encryption Standard is an algorithm used for which of the following?(分数:2.00)A.Data integrityB.Bulk data encryptionC.Key recoveryD.Distribution of symmetric keys18.SSL is a de facto protocol used for securing t
18、ransactions that occur over untrusted networks. Which of the following best describes what takes place during an SSL connection setup process?(分数:2.00)A.The server creates a session key and encrypts it with a public key.B.The server creates a session key and encrypts it with a private key.C.The clie
19、nt creates a session key and encrypts it with a private key.D.The client creates a session key and encrypts it with a public key.19.The CA is responsible for revoking certificates when necessary. Which of the following correctly describes a CRL and OSCP?(分数:2.00)A.The CRL was developed as a more str
20、eamlined approach to OCSP.B.OCSP is a protocol that submits revoked certificates to the CRL.C.OCSP is a protocol developed specifically to check the CRL during a certificate validation process.D.CRL carries out real-time validation of a certificate and reports to the OCSP.20.End-to-end encryption is
21、 used by users, and link encryption is used by service providers. Which of the following correctly describes these technologies?(分数:2.00)A.Link encryption does not encrypt headers and trailers.B.Link encryption encrypts everything but data link messaging.C.End-io-end encryption requires headers to b
22、e decrypted at each hop.D.End-to-end encryption encrypts all headers and trailers.21.What do the SA values in the graphic of IPSec that follows represent? (分数:2.00)A.Security parameter indexB.Security abilityC.Security associationD.Security assistant22.There are several different types of technologi
23、es within cryptography that provide confidentiality. What is represented in the graphic that follows? (分数:2.00)A.Running key cipherB.Concealment cipherC.SteganographyD.One-time pad23.There are several different types of important architectures within public key infrastructures. Which architecture do
24、es the graphic that follows represent? (分数:2.00)A.Cross-certificationB.Cross-revocation listC.Online Certificate Status ProtocolD.Registration authority24.There are different ways of providing integrity and authentication within cryptography. What type of technology is shown in the graphic that foll
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机 职业资格 CISSP 认证 考试 密码学 试卷 答案 解析 DOC
