Which of the following statements is most accurate regarding a digital signature?
Which of the following is not a DES mode of operation?
Which protocol makes USE of an electronic wallet on a customer's PC and sends encrypted credit card information to merchant's Web server, which digitally signs it and sends it on to its processing bank?
In what type of attack does an attacker try, from several encrypted messages, to figure out the key used in the encryption process?
What is the maximum key size for the RC5 algorithm?
Which of the following encryption algorithms does not deal with discrete logarithms?
What are the three most important functions that Digital Signatures perform?
Complete the blanks. When using PKI, I digitally sign a message using my ______ key. The recipient verifies my signature using my ______ key.
Which of the following can be best defined as computing techniques for inseparably embedding unobtrusive marks or labels as bits in digital data and for detecting or extracting the marks later?
What can be defined as a data structure that enumerates digital certificates that were issued to CAs but have been invalidated by their issuer prior to when they were scheduled to expire?
Which of the following binds a subject name to a public key value?
Which is NOT a suitable method for distributing certificate revocation information?
A X.509 public key certificate with the key usage attribute "non repudiation" can be used for which of the following?
What uses a key of the same length as the message where each bit or character from the plaintext is encrypted by a modular addition?
In a known plaintext attack, the cryptanalyst has knowledge of which of the following?
Which of the following would best define a digital envelope?
Which of the following keys has the SHORTEST lifespan?
Which of the following is not a one-way hashing algorithm?
Which of the following ciphers is a subset on which the Vigenere polyalphabetic cipher was based on?
Which of the following can best be defined as a key distribution protocol that uses hybrid encryption to convey session keys. This protocol establishes a long-term key once, and then requires no prior communication in order to establish or exchange keys on a session-by-session basis?
PDF + Testing Engine
|
---|
$57.75 |
Testing Engine
|
---|
$43.75 |
PDF (Q&A)
|
---|
$36.75 |
ISC Free Exams |
---|
![]() |