CISSP Crypto Ciphers

Exit

Question 1 of 1

  Time Left


0 [{"id":60426,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:29:38","updated_at":"2016-04-29 01:29:38","questionName":"You are trying a new product out that can encrypt files which can then be mounted and appears as a disk drive on your computer when it's unlocked. As you install the product you are prompted to randomly run your mouse around to generate some random data for the application to use? What is this randomness called in the crypto world?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60422,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:22:46","updated_at":"2016-04-29 01:22:46","questionName":"Which of the following is more suitable for a hardware implementation?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53741,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-13 01:09:38","updated_at":"2016-04-13 01:18:22","questionName":"Which crypto cipher type is Diffie-Hellman?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":55037,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-16 00:24:50","updated_at":"2016-04-16 00:24:50","questionName":"To replace one letter of the alphabet by another value. It is sometimes accomplished by shifting the alphabet x number of places.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60425,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:28:34","updated_at":"2016-04-29 01:28:34","questionName":"In this Block Cipher method of encryption, a relationship between the plaintext and the encryption key is so complicated that an attacker can't alter the plaintext to determine the key.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":55034,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-16 00:22:03","updated_at":"2016-04-16 00:22:03","questionName":"In this Block Cipher method of encryption, a single bit change in the plain text results in multiple changes permutated throughout the rest of the encryption cycles so in the end, the ciphertext has completely changed.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60424,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:27:17","updated_at":"2016-04-29 01:27:17","questionName":"Public Key Infrastructure (PKI) consists of programs, data formats, procedures, communication protocols, security policies, and public key cryptographic mechanisms working in a comprehensive manner to enable a wide range of dispersed people to communicate in a secure and predictable fashion. This infrastructure is based upon which of the following standard?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":55036,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-16 00:23:58","updated_at":"2016-04-16 00:23:58","questionName":"Block Cipher that scrambles the message by reordering the plaintext.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53744,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-13 01:11:31","updated_at":"2016-04-13 01:18:22","questionName":"What type of crypto cipher is RSA?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60419,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:18:07","updated_at":"2016-04-29 01:18:07","questionName":"What is the maximum allowable key size of the Rijndael encryption algorithm?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":58215,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-21 19:56:08","updated_at":"2016-04-21 19:56:08","questionName":"Which of the following statements pertaining to key management is INCORRECT?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":55035,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-16 00:23:10","updated_at":"2016-04-16 00:23:10","questionName":"Uses a relationship between plaintext and the key that is so complex the attacker can't alter the plaintext, examine the cipher text to determine the key.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53743,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-13 01:11:05","updated_at":"2016-04-13 01:18:22","questionName":"What type of crypto cipher is ECC?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53742,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-13 01:10:24","updated_at":"2016-04-13 01:18:22","questionName":"What type of crypto cipher is El Galmal: DH+nonrepudiation?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60423,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:25:01","updated_at":"2016-04-29 01:25:01","questionName":"Which of the following would best define a digital envelope?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null}]
60426
0
120
block

You are trying a new product out that can encrypt files which can then be mounted and appears as a disk drive on your computer when it's unlocked. As you install the product you are prompted to randomly run your mouse around to generate some random data for the application to use? What is this randomness called in the crypto world?

Select the correct answer(s).  

(0/0)












60422
0
120
none
53741
0
120
none
55037
0
120
none
60425
0
120
none
55034
0
120
none
60424
0
120
none
55036
0
120
none
53744
0
120
none
60419
0
120
none
58215
0
120
none
55035
0
120
none
53743
0
120
none
53742
0
120
none
60423
0
120
none