CISSP Crypto Ciphers

Exit

Question 1 of 1

  Time Left


0 [{"id":53744,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-13 01:11:31","updated_at":"2016-04-13 01:18:22","questionName":"What type of crypto cipher is RSA?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":55034,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-16 00:22:03","updated_at":"2016-04-16 00:22:03","questionName":"In this Block Cipher method of encryption, a single bit change in the plain text results in multiple changes permutated throughout the rest of the encryption cycles so in the end, the ciphertext has completely changed.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53741,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-13 01:09:38","updated_at":"2016-04-13 01:18:22","questionName":"Which crypto cipher type is Diffie-Hellman?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60422,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:22:46","updated_at":"2016-04-29 01:22:46","questionName":"Which of the following is more suitable for a hardware implementation?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60423,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:25:01","updated_at":"2016-04-29 01:25:01","questionName":"Which of the following would best define a digital envelope?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":58215,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-21 19:56:08","updated_at":"2016-04-21 19:56:08","questionName":"Which of the following statements pertaining to key management is INCORRECT?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53742,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-13 01:10:24","updated_at":"2016-04-13 01:18:22","questionName":"What type of crypto cipher is El Galmal: DH+nonrepudiation?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":55035,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-16 00:23:10","updated_at":"2016-04-16 00:23:10","questionName":"Uses a relationship between plaintext and the key that is so complex the attacker can't alter the plaintext, examine the cipher text to determine the key.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60426,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:29:38","updated_at":"2016-04-29 01:29:38","questionName":"You are trying a new product out that can encrypt files which can then be mounted and appears as a disk drive on your computer when it's unlocked. As you install the product you are prompted to randomly run your mouse around to generate some random data for the application to use? What is this randomness called in the crypto world?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53743,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-13 01:11:05","updated_at":"2016-04-13 01:18:22","questionName":"What type of crypto cipher is ECC?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":55036,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-16 00:23:58","updated_at":"2016-04-16 00:23:58","questionName":"Block Cipher that scrambles the message by reordering the plaintext.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60425,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:28:34","updated_at":"2016-04-29 01:28:34","questionName":"In this Block Cipher method of encryption, a relationship between the plaintext and the encryption key is so complicated that an attacker can't alter the plaintext to determine the key.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60419,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:18:07","updated_at":"2016-04-29 01:18:07","questionName":"What is the maximum allowable key size of the Rijndael encryption algorithm?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":55037,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-16 00:24:50","updated_at":"2016-04-16 00:24:50","questionName":"To replace one letter of the alphabet by another value. It is sometimes accomplished by shifting the alphabet x number of places.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60424,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:27:17","updated_at":"2016-04-29 01:27:17","questionName":"Public Key Infrastructure (PKI) consists of programs, data formats, procedures, communication protocols, security policies, and public key cryptographic mechanisms working in a comprehensive manner to enable a wide range of dispersed people to communicate in a secure and predictable fashion. This infrastructure is based upon which of the following standard?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null}]
53744
0
120
block

What type of crypto cipher is RSA?

Select the Correct Answers  

(0/0)










55034
0
120
none
53741
0
120
none
60422
0
120
none
60423
0
120
none
58215
0
120
none
53742
0
120
none
55035
0
120
none
60426
0
120
none
53743
0
120
none
55036
0
120
none
60425
0
120
none
60419
0
120
none
55037
0
120
none
60424
0
120
none