CISSP FIPS Publications

Question 1 of 1

  Time Left


0 [{"id":35075,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:23:22","updated_at":"2016-02-20 15:47:03","questionName":"Develops standards for categorizing information and information systems.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":4,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35084,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:34:53","updated_at":"2016-02-20 15:47:03","questionName":"This standard specifies secure hash algorithms for computing a condensed representation of electronic data (message).","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":8,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35065,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:10:11","updated_at":"2016-02-20 15:47:03","questionName":"Is based on an instance of the KECCAK algorithm, two cryptographic hash functions and two extendable-output functions (XOF)","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35082,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:31:45","updated_at":"2016-02-20 15:47:03","questionName":"This standard specifies algorithms for applications requiring digital signature, rather than written signature.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":7,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35063,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:06:18","updated_at":"2016-02-20 15:47:03","questionName":"Hash functions are components for many important security applications. Which is not one of the components below?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35072,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:19:52","updated_at":"2016-02-20 15:47:03","questionName":"Standard addresses the specification of minimum security requirements for federal information and information systems.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35077,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:26:20","updated_at":"2016-02-20 15:47:03","questionName":"Standard specifying an algorithm for applications requiring message authentication via construction of a message authentication code (MAC)","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":5,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35085,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:38:31","updated_at":"2016-02-20 15:47:03","questionName":"This standard specifies the security requirements within a security system protecting sensitive but unclassified information.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35086,"quiz_id":"3187","answer_id":null,"answerType_id":"2","created_at":"2016-02-20 15:46:46","updated_at":"2016-02-20 15:47:03","questionName":"In FIPS PUB 140-2 there are four levels of security. Match the level with the appropriate definition.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35067,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:15:20","updated_at":"2016-02-20 15:47:03","questionName":"The standard is applicable to identification issued by Federal departments and agencies to Federal employees and contractors for gaining physical access to Federally controlled facilities and logical access to Federally controlled information systems, except for \"national security systems\".","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35080,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:29:20","updated_at":"2016-02-20 15:47:03","questionName":"Specifies the FIPS approved cryptographic algorithm that can be used to protect electronic data.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":6,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]
35075
0
120
block

Develops standards for categorizing information and information systems.

Select the correct answer(s).  

(0/0)












35084
0
120
none
35065
0
120
none
35082
0
120
none
35063
0
120
none
35072
0
120
none
35077
0
120
none
35085
0
120
none
35086
0
120
none
35067
0
120
none
35080
0
120
none