O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Sample questions

Q1. Cryptographic algorithms would include all of the these except?

  1. Data Encryption Standard
  2. Advanced Encryption Standard
  3. Transport Layer Security
  4. Message Digest Algorithm

Q2. Which one of the following is called a crypto variable?

  1. Plain Text
  2. Cipher Text
  3. Cipher
  4. Cryptographic Key

Q3. Identify the best explanation from the following for a digital signature?

  1. Applying senders private key to the message
  2. Applying senders public key to the message
  3. Applying receivers private key to the message
  4. Applying receivers public key to the message

Q4. When a specific key is authorized for use by legitimate entities, and that usage is based on time, it is known as what?

  1. Cryptanalysis
  2. Cryptography
  3. Crypto period
  4. Key usage

Q5. Which one of the following is a type of cryptanalytic ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required