CISSP Crypto Ciphers

Exit

Question 1 of 1

  Time Left


0 [{"id":53744,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-13 01:11:31","updated_at":"2016-04-13 01:18:22","questionName":"What type of crypto cipher is RSA?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":55037,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-16 00:24:50","updated_at":"2016-04-16 00:24:50","questionName":"To replace one letter of the alphabet by another value. It is sometimes accomplished by shifting the alphabet x number of places.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":55035,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-16 00:23:10","updated_at":"2016-04-16 00:23:10","questionName":"Uses a relationship between plaintext and the key that is so complex the attacker can't alter the plaintext, examine the cipher text to determine the key.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60419,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:18:07","updated_at":"2016-04-29 01:18:07","questionName":"What is the maximum allowable key size of the Rijndael encryption algorithm?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60426,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:29:38","updated_at":"2016-04-29 01:29:38","questionName":"You are trying a new product out that can encrypt files which can then be mounted and appears as a disk drive on your computer when it's unlocked. As you install the product you are prompted to randomly run your mouse around to generate some random data for the application to use? What is this randomness called in the crypto world?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53741,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-13 01:09:38","updated_at":"2016-04-13 01:18:22","questionName":"Which crypto cipher type is Diffie-Hellman?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60424,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:27:17","updated_at":"2016-04-29 01:27:17","questionName":"Public Key Infrastructure (PKI) consists of programs, data formats, procedures, communication protocols, security policies, and public key cryptographic mechanisms working in a comprehensive manner to enable a wide range of dispersed people to communicate in a secure and predictable fashion. This infrastructure is based upon which of the following standard?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":55036,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-16 00:23:58","updated_at":"2016-04-16 00:23:58","questionName":"Block Cipher that scrambles the message by reordering the plaintext.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60423,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:25:01","updated_at":"2016-04-29 01:25:01","questionName":"Which of the following would best define a digital envelope?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":55034,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-16 00:22:03","updated_at":"2016-04-16 00:22:03","questionName":"In this Block Cipher method of encryption, a single bit change in the plain text results in multiple changes permutated throughout the rest of the encryption cycles so in the end, the ciphertext has completely changed.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53743,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-13 01:11:05","updated_at":"2016-04-13 01:18:22","questionName":"What type of crypto cipher is ECC?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":58215,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-21 19:56:08","updated_at":"2016-04-21 19:56:08","questionName":"Which of the following statements pertaining to key management is INCORRECT?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60422,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:22:46","updated_at":"2016-04-29 01:22:46","questionName":"Which of the following is more suitable for a hardware implementation?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53742,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-13 01:10:24","updated_at":"2016-04-13 01:18:22","questionName":"What type of crypto cipher is El Galmal: DH+nonrepudiation?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60425,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:28:34","updated_at":"2016-04-29 01:28:34","questionName":"In this Block Cipher method of encryption, a relationship between the plaintext and the encryption key is so complicated that an attacker can't alter the plaintext to determine the key.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null}]
53744
0
120
block

What type of crypto cipher is RSA?

Select the correct answer(s).  

(0/0)










55037
0
120
none
55035
0
120
none
60419
0
120
none
60426
0
120
none
53741
0
120
none
60424
0
120
none
55036
0
120
none
60423
0
120
none
55034
0
120
none
53743
0
120
none
58215
0
120
none
60422
0
120
none
53742
0
120
none
60425
0
120
none