Are you looking for some good practice test questions and answers on CISSP cryptography? Then, you've arrived at the right place. In this test, we will be asking you questions related to cryptography and its related concepts. You have to choose the correct option for every given question. Do you think you can pass this test? Let's start the quiz See moreand see how well you score. So, are you ready? Let's get started then.
Diffie–Hellman
Rijndael
Blowfish
SHA-256
Rate this question:
A symmetric algorithm provides better access control.
A symmetric algorithm is a faster process.
A symmetric algorithm provides nonrepudiation of delivery.
A symmetric algorithm is more difficult to implement.
Rate this question:
Send a digital signature of the message to the recipient
Encrypt the message with a symmetric algorithm and send it
Encrypt the message with a private key so the recipient can decrypt with the corresponding public key
Create a checksum, append it to the message, encrypt the message, then send to recipient.
Protection of public keys of all users
History of symmetric keys
Proof of nonrepudiation of origin
Validation that a public key is associated with a particular user
160 bits
150 bits
128 bits
104 bits
Protection and secrecy of keys
Financial records and retention of encrypted data
Formalizing a key hierarchy
The lifespan of key-encrypting keys (KKMs)
Setting new key expiry dates
Updating the certificate revocation list
Removal of the private key from all directories
Notification to all employees of revoked keys
Link encryption encrypts routing information.
Link encryption is often used for Frame Relay or satellite links.
Link encryption is suitable for high-risk environments.
Link encryption provides better traffic flow confidentiality.
Rate this question:
Encoder
Decoder wheel
Cryptovariable
Cryptographic routine
Diffusion
Confusion
Step function
SP-network
Substitution and transposition
Block and stream
Symmetric and asymmetric
DES and AES
Availability
Confidentiality
Integrity
Authenticity
Rate this question:
Substitution ciphers
Transposition ciphers
Polyalphabetic ciphers
Inversion ciphers
Rate this question:
Modular arithmetic
XOR mathematics
Factoring
Exponentiation
Rate this question:
AES
DES
One-time pad
Triple DES
Rate this question:
Picture files
Music files
Video files
All of the above
Rate this question:
Quiz Review Timeline (Updated): May 1, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.