[计算机类试卷]CISSP认证考试(密码学)模拟试卷1及答案与解析.doc
《[计算机类试卷]CISSP认证考试(密码学)模拟试卷1及答案与解析.doc》由会员分享,可在线阅读,更多相关《[计算机类试卷]CISSP认证考试(密码学)模拟试卷1及答案与解析.doc(34页珍藏版)》请在麦多课文档分享上搜索。
1、CISSP认证考试(密码学)模拟试卷 1及答案与解析 1 There are several components involved with steganography. Which of the following refers to a file that has hidden information in it? ( A) Stego-medium ( B) Concealment cipher ( C) Carrier ( D) Payload 2 Which of the following correctly describes the relationship between
2、SSL and TLS? ( A) TLS is the open-community version of SSL. ( B) SSL can be modified by developers to expand the protocols capabilities. ( C) TLS is a proprietary protocol, while SSL is an open-community protocol. ( D) SSL is more extensible and backward compatible with TLS. 3 Which of the following
3、 incorrectly describes steganography? ( A) It is a type of security through obscurity. ( B) Modifying the most significant bit is the most common method used. ( C) Steganography does not draw attention to itself like encryption does. ( D) Media files are ideal for steganographic transmission because
4、 of their large size. 4 Which of the following correctly describes a drawback of symmetric key systems? ( A) Computationally less intensive than asymmetric systems ( B) Work much more slowly than asymmetric systems ( C) Carry out mathematically intensive tasks ( D) Key must be delivered via secure c
5、ourier 5 Which of the following occurs in a PK.I environment? ( A) The RA creates the certificate, and the CA signs it. ( B) The CA signs the certificate. ( C) The RA signs the certificate. ( D) The user signs the certificate. 6 Encryption can happen at different layers of an operating system and ne
6、twork stack. Where does PPTP encryption take place? ( A) Data link layer ( B) Within applications ( C) Transport layer ( D) Data link and physical layers 7 Which of the following correctly describes the difference between public key cryptography and public key infrastructure? ( A) Public key cryptog
7、raphy is the use of an asymmetric algorithm, while public key infrastructure is the use of a symmetric algorithm. ( B) Public key cryptography is used to create public/private key pairs, and public key infrastructure is used to perform key exchange and agreement. ( C) Public key cryptography provide
8、s authentication and nonrepudiation, while public key infrastructure provides confidentiality and integrity. ( D) Public key cryptography is another name for asymmetric cryptography, while public key infrastructure consists of public key cryptographic mechanisms. 8 Which of the following best descri
9、bes Key Derivation Functions (KDFs)? ( A) Keys are generated from a master key. ( B) Session keys are generated from each other. ( C) Asymmetric cryptography is used to encrypt symmetric keys. ( D) A master key is generated from a session key. 9 An elliptic curve cryptosystem is an asymmetric algori
10、thm. What sets it apart from other asymmetric algorithms? ( A) It provides digital signatures, secure key distribution, and encryption. ( B) It computes discrete logarithms in a finite field. ( C) It uses a larger percentage of resources to carry out encryption. ( D) It is more efficient. 10 If impl
11、emented properly, a one-time pad is a perfect encryption scheme. Which of the following incorrectly describes a requirement for implementation? ( A) The pad must be securely distributed and protected at its destination. ( B) The pad must be made up of truly random values. ( C) The pad must always be
12、 the same length. ( D) The pad must be used only one time. 11 Sally is responsible for key management within her organization. Which of the following incorrectly describes a principle of secure key management? ( A) Keys should be backed up or escrowed in case of emergencies. ( B) The more a key is u
13、sed, the shorter its lifetime should be. ( C) Less secure data allows for a shorter key lifetime. ( D) Keys should be stored and transmitted by secure means. 12 Mandy needs to calculate how many keys must be generated for the 260 employees using the companys PKI asymmetric algorithm. How many keys a
14、re required? ( A) 33,670 ( B) 520 ( C) 67340 ( D) 260 13 Which of the following works similarly to stream ciphers? ( A) One-time pad ( B) AES ( C) Block ( D) RSA 14 There are two main types of symmetric ciphers: stream and block. Which of the following is not an attribute of a good stream cipher? (
15、A) Statistically unbiased keystream ( B) Statistically predictable ( C) Long periods of no repeating patterns ( D) Keystream not linearly related to key 15 Which of the following best describes how a digital signature is created? ( A) The sender encrypts a message digest with his private key. ( B) T
16、he sender encrypts a message digest with his public key. ( C) The receiver encrypts a message digest with his private key. ( D) The receiver encrypts a message digest with his public key. 16 In cryptography, different steps and algorithms provide different types of security services. Which of the fo
17、llowing provides only authentication, nonrepudiation, and integrity? ( A) Encryption algorithm ( B) Hash algorithm ( C) Digital signature ( D) Encryption paired with a digital signature 17 Advanced Encryption Standard is an algorithm used for which of the following? ( A) Data integrity ( B) Bulk dat
18、a encryption ( C) Key recovery ( D) Distribution of symmetric keys 18 SSL is a de facto protocol used for securing transactions that occur over untrusted networks. Which of the following best describes what takes place during an SSL connection setup process? ( A) The server creates a session key and
19、 encrypts it with a public key. ( B) The server creates a session key and encrypts it with a private key. ( C) The client creates a session key and encrypts it with a private key. ( D) The client creates a session key and encrypts it with a public key. 19 The CA is responsible for revoking certifica
20、tes when necessary. Which of the following correctly describes a CRL and OSCP? ( A) The CRL was developed as a more streamlined approach to OCSP. ( B) OCSP is a protocol that submits revoked certificates to the CRL. ( C) OCSP is a protocol developed specifically to check the CRL during a certificate
21、 validation process. ( D) CRL carries out real-time validation of a certificate and reports to the OCSP. 20 End-to-end encryption is used by users, and link encryption is used by service providers. Which of the following correctly describes these technologies? ( A) Link encryption does not encrypt h
22、eaders and trailers. ( B) Link encryption encrypts everything but data link messaging. ( C) End-io-end encryption requires headers to be decrypted at each hop. ( D) End-to-end encryption encrypts all headers and trailers. 21 What do the SA values in the graphic of IPSec that follows represent? ( A)
23、Security parameter index ( B) Security ability ( C) Security association ( D) Security assistant 22 There are several different types of technologies within cryptography that provide confidentiality. What is represented in the graphic that follows? ( A) Running key cipher ( B) Concealment cipher ( C
24、) Steganography ( D) One-time pad 23 There are several different types of important architectures within public key infrastructures. Which architecture does the graphic that follows represent? ( A) Cross-certification ( B) Cross-revocation list ( C) Online Certificate Status Protocol ( D) Registrati
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机 试卷 CISSP 认证 考试 密码学 模拟 答案 解析 DOC
