CISSP FIPS Publications

Exit

Question 1 of 1

  Time Left


0 [{"id":35077,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:26:20","updated_at":"2016-02-20 15:47:03","questionName":"Standard specifying an algorithm for applications requiring message authentication via construction of a message authentication code (MAC)","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":5,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35072,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:19:52","updated_at":"2016-02-20 15:47:03","questionName":"Standard addresses the specification of minimum security requirements for federal information and information systems.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35082,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:31:45","updated_at":"2016-02-20 15:47:03","questionName":"This standard specifies algorithms for applications requiring digital signature, rather than written signature.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":7,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35086,"quiz_id":"3187","answer_id":null,"answerType_id":"2","created_at":"2016-02-20 15:46:46","updated_at":"2016-02-20 15:47:03","questionName":"In FIPS PUB 140-2 there are four levels of security. Match the level with the appropriate definition.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35084,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:34:53","updated_at":"2016-02-20 15:47:03","questionName":"This standard specifies secure hash algorithms for computing a condensed representation of electronic data (message).","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":8,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35085,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:38:31","updated_at":"2016-02-20 15:47:03","questionName":"This standard specifies the security requirements within a security system protecting sensitive but unclassified information.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35075,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:23:22","updated_at":"2016-02-20 15:47:03","questionName":"Develops standards for categorizing information and information systems.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":4,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35065,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:10:11","updated_at":"2016-02-20 15:47:03","questionName":"Is based on an instance of the KECCAK algorithm, two cryptographic hash functions and two extendable-output functions (XOF)","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35063,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:06:18","updated_at":"2016-02-20 15:47:03","questionName":"Hash functions are components for many important security applications. Which is not one of the components below?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35080,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:29:20","updated_at":"2016-02-20 15:47:03","questionName":"Specifies the FIPS approved cryptographic algorithm that can be used to protect electronic data.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":6,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35067,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:15:20","updated_at":"2016-02-20 15:47:03","questionName":"The standard is applicable to identification issued by Federal departments and agencies to Federal employees and contractors for gaining physical access to Federally controlled facilities and logical access to Federally controlled information systems, except for \"national security systems\".","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]
35077
0
120
block

Standard specifying an algorithm for applications requiring message authentication via construction of a message authentication code (MAC)

Select the Correct Answers  

(0/0)












35072
0
120
none
35082
0
120
none
35086
0
120
none
35084
0
120
none
35085
0
120
none
35075
0
120
none
35065
0
120
none
35063
0
120
none
35080
0
120
none
35067
0
120
none