CISSP FIPS Publications

Exit

Question 1 of 1

  Time Left


0 [{"id":35072,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:19:52","updated_at":"2016-02-20 15:47:03","questionName":"Standard addresses the specification of minimum security requirements for federal information and information systems.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35075,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:23:22","updated_at":"2016-02-20 15:47:03","questionName":"Develops standards for categorizing information and information systems.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":4,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35080,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:29:20","updated_at":"2016-02-20 15:47:03","questionName":"Specifies the FIPS approved cryptographic algorithm that can be used to protect electronic data.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":6,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35085,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:38:31","updated_at":"2016-02-20 15:47:03","questionName":"This standard specifies the security requirements within a security system protecting sensitive but unclassified information.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35077,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:26:20","updated_at":"2016-02-20 15:47:03","questionName":"Standard specifying an algorithm for applications requiring message authentication via construction of a message authentication code (MAC)","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":5,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35082,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:31:45","updated_at":"2016-02-20 15:47:03","questionName":"This standard specifies algorithms for applications requiring digital signature, rather than written signature.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":7,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35067,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:15:20","updated_at":"2016-02-20 15:47:03","questionName":"The standard is applicable to identification issued by Federal departments and agencies to Federal employees and contractors for gaining physical access to Federally controlled facilities and logical access to Federally controlled information systems, except for \"national security systems\".","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35063,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:06:18","updated_at":"2016-02-20 15:47:03","questionName":"Hash functions are components for many important security applications. Which is not one of the components below?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35084,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:34:53","updated_at":"2016-02-20 15:47:03","questionName":"This standard specifies secure hash algorithms for computing a condensed representation of electronic data (message).","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":8,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35086,"quiz_id":"3187","answer_id":null,"answerType_id":"2","created_at":"2016-02-20 15:46:46","updated_at":"2016-02-20 15:47:03","questionName":"In FIPS PUB 140-2 there are four levels of security. Match the level with the appropriate definition.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35065,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:10:11","updated_at":"2016-02-20 15:47:03","questionName":"Is based on an instance of the KECCAK algorithm, two cryptographic hash functions and two extendable-output functions (XOF)","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]
35072
0
120
block

Standard addresses the specification of minimum security requirements for federal information and information systems.

Select the correct answer(s).  

(0/0)












35075
0
120
none
35080
0
120
none
35085
0
120
none
35077
0
120
none
35082
0
120
none
35067
0
120
none
35063
0
120
none
35084
0
120
none
35086
0
120
none
35065
0
120
none