Black Friday Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

ISC SSCP Exam Made Easy: Step-by-Step Preparation Guide

Questions 81

Which of the following statements is most accurate regarding a digital signature?

Options:

A.

It is a method used to encrypt confidential data.

B.

It is the art of transferring handwritten signature to electronic media.

C.

It allows the recipient of data to prove the source and integrity of data.

D.

It can be used as a signature system and a cryptosystem.

Buy Now
Questions 82

Which of the following is not a DES mode of operation?

Options:

A.

Cipher block chaining

B.

Electronic code book

C.

Input feedback

D.

Cipher feedback

Buy Now
Questions 83

Which protocol makes USE of an electronic wallet on a customer's PC and sends encrypted credit card information to merchant's Web server, which digitally signs it and sends it on to its processing bank?

Options:

A.

SSH ( Secure Shell)

B.

S/MIME (Secure MIME)

C.

SET (Secure Electronic Transaction)

D.

SSL (Secure Sockets Layer)

Buy Now
Questions 84

In what type of attack does an attacker try, from several encrypted messages, to figure out the key used in the encryption process?

Options:

A.

Known-plaintext attack

B.

Ciphertext-only attack

C.

Chosen-Ciphertext attack

D.

Plaintext-only attack

Buy Now
Questions 85

What is the maximum key size for the RC5 algorithm?

Options:

A.

128 bits

B.

256 bits

C.

1024 bits

D.

2040 bits

Buy Now
Questions 86

Which of the following encryption algorithms does not deal with discrete logarithms?

Options:

A.

El Gamal

B.

Diffie-Hellman

C.

RSA

D.

Elliptic Curve

Buy Now
Questions 87

What are the three most important functions that Digital Signatures perform?

Options:

A.

Integrity, Confidentiality and Authorization

B.

Integrity, Authentication and Nonrepudiation

C.

Authorization, Authentication and Nonrepudiation

D.

Authorization, Detection and Accountability

Buy Now
Questions 88

Complete the blanks. When using PKI, I digitally sign a message using my ______ key. The recipient verifies my signature using my ______ key.

Options:

A.

Private / Public

B.

Public / Private

C.

Symmetric / Asymmetric

D.

Private / Symmetric

Buy Now
Questions 89

Which of the following can be best defined as computing techniques for inseparably embedding unobtrusive marks or labels as bits in digital data and for detecting or extracting the marks later?

Options:

A.

Steganography

B.

Digital watermarking

C.

Digital enveloping

D.

Digital signature

Buy Now
Questions 90

What can be defined as a data structure that enumerates digital certificates that were issued to CAs but have been invalidated by their issuer prior to when they were scheduled to expire?

Options:

A.

Certificate revocation list

B.

Certificate revocation tree

C.

Authority revocation list

D.

Untrusted certificate list

Buy Now
Questions 91

Which of the following binds a subject name to a public key value?

Options:

A.

A public-key certificate

B.

A public key infrastructure

C.

A secret key infrastructure

D.

A private key certificate

Buy Now
Questions 92

Which is NOT a suitable method for distributing certificate revocation information?

Options:

A.

CA revocation mailing list

B.

Delta CRL

C.

OCSP (online certificate status protocol)

D.

Distribution point CRL

Buy Now
Questions 93

A X.509 public key certificate with the key usage attribute "non repudiation" can be used for which of the following?

Options:

A.

encrypting messages

B.

signing messages

C.

verifying signed messages

D.

decrypt encrypted messages

Buy Now
Questions 94

What uses a key of the same length as the message where each bit or character from the plaintext is encrypted by a modular addition?

Options:

A.

Running key cipher

B.

One-time pad

C.

Steganography

D.

Cipher block chaining

Buy Now
Questions 95

In a known plaintext attack, the cryptanalyst has knowledge of which of the following?

Options:

A.

the ciphertext and the key

B.

the plaintext and the secret key

C.

both the plaintext and the associated ciphertext of several messages

D.

the plaintext and the algorithm

Buy Now
Questions 96

Which of the following would best define a digital envelope?

Options:

A.

A message that is encrypted and signed with a digital certificate.

B.

A message that is signed with a secret key and encrypted with the sender's private key.

C.

A message encrypted with a secret key attached with the message. The secret key is encrypted with the public key of the receiver.

D.

A message that is encrypted with the recipient's public key and signed with the sender's private key.

Buy Now
Questions 97

Which of the following keys has the SHORTEST lifespan?

Options:

A.

Secret key

B.

Public key

C.

Session key

D.

Private key

Buy Now
Questions 98

Which of the following is not a one-way hashing algorithm?

Options:

A.

MD2

B.

RC4

C.

SHA-1

D.

HAVAL

Buy Now
Questions 99

Which of the following ciphers is a subset on which the Vigenere polyalphabetic cipher was based on?

Options:

A.

Caesar

B.

The Jefferson disks

C.

Enigma

D.

SIGABA

Buy Now
Questions 100

Which of the following can best be defined as a key distribution protocol that uses hybrid encryption to convey session keys. This protocol establishes a long-term key once, and then requires no prior communication in order to establish or exchange keys on a session-by-session basis?

Options:

A.

Internet Security Association and Key Management Protocol (ISAKMP)

B.

Simple Key-management for Internet Protocols (SKIP)

C.

Diffie-Hellman Key Distribution Protocol

D.

IPsec Key exchange (IKE)

Buy Now