CISSP FIPS Publications

Exit

Question 1 of 1

  Time Left


0 [{"id":35085,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:38:31","updated_at":"2016-02-20 15:47:03","questionName":"This standard specifies the security requirements within a security system protecting sensitive but unclassified information.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35072,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:19:52","updated_at":"2016-02-20 15:47:03","questionName":"Standard addresses the specification of minimum security requirements for federal information and information systems.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35084,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:34:53","updated_at":"2016-02-20 15:47:03","questionName":"This standard specifies secure hash algorithms for computing a condensed representation of electronic data (message).","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":8,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35082,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:31:45","updated_at":"2016-02-20 15:47:03","questionName":"This standard specifies algorithms for applications requiring digital signature, rather than written signature.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":7,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35067,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:15:20","updated_at":"2016-02-20 15:47:03","questionName":"The standard is applicable to identification issued by Federal departments and agencies to Federal employees and contractors for gaining physical access to Federally controlled facilities and logical access to Federally controlled information systems, except for \"national security systems\".","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35077,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:26:20","updated_at":"2016-02-20 15:47:03","questionName":"Standard specifying an algorithm for applications requiring message authentication via construction of a message authentication code (MAC)","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":5,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35086,"quiz_id":"3187","answer_id":null,"answerType_id":"2","created_at":"2016-02-20 15:46:46","updated_at":"2016-02-20 15:47:03","questionName":"In FIPS PUB 140-2 there are four levels of security. Match the level with the appropriate definition.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35065,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:10:11","updated_at":"2016-02-20 15:47:03","questionName":"Is based on an instance of the KECCAK algorithm, two cryptographic hash functions and two extendable-output functions (XOF)","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35080,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:29:20","updated_at":"2016-02-20 15:47:03","questionName":"Specifies the FIPS approved cryptographic algorithm that can be used to protect electronic data.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":6,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35063,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:06:18","updated_at":"2016-02-20 15:47:03","questionName":"Hash functions are components for many important security applications. Which is not one of the components below?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35075,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:23:22","updated_at":"2016-02-20 15:47:03","questionName":"Develops standards for categorizing information and information systems.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":4,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]
35085
0
120
block

This standard specifies the security requirements within a security system protecting sensitive but unclassified information.

Select the correct answer(s).  

(0/0)












35072
0
120
none
35084
0
120
none
35082
0
120
none
35067
0
120
none
35077
0
120
none
35086
0
120
none
35065
0
120
none
35080
0
120
none
35063
0
120
none
35075
0
120
none