Jim and Joe work at Crypty Solutions Inc. They want to share messages in a secure way where it is immune to attacks. What do you think Jim and Joe should implement?
A. 
Cryptography
B. 
Cryptanalysis
C. 
Either (a) or (b)
D. 
Neither (a) nor (b)
2.
Now, Jim and Joe want their secret messages to be shared via a single key. Which cipher according to you is suitable in this case?
A. 
Symmetric-Key
B. 
Asymmetric-Key
C. 
Either (a) or (b)
D. 
Neither (a) nor (b)
3.
Jim and Joe decide to use Diffie-Hellman method. If they are not authenticated to each other, what type of security attack can be expected?
A. 
Plaintext attack
B. 
Cipher text attack
C. 
Man-in-the-middle attack
D. 
None of the above
4.
Jim wants to login to his Chat engine to ping Joe. The chat engine’s admin failed to include random string for password hash. What was missed in the implementation?
A. 
Sheepdip
B. 
Salt
C. 
Bypass
D. 
Dongle
5.
Jim has encrypted his company’s confidential files using a secret key. Attacker John tries to decipher those files without knowing the key, what is this process called?
A. 
Cryptography
B. 
Cryptanalysis
C. 
Decryption
D. 
None of the above
6.
Joe scheduled a company meeting and shared the location to Jim as “ZGTNU JHII” using substitution cipher, can you help Jim to find the location?
Here are the substitution values by Joe:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
H D M S G K T J W A O I B P R X L Z U C N Y E Q V F
Are you looking for some good practice test questions and answers on CISSP cryptography? Then, you've arrived at the right place. In this test, we will be asking you questions related to cryptography and its related concepts....
Questions: 17 | Attempts: 8570 | Last updated: May 1, 2022
Sample Question
Asymmetric key cryptography is used for all of the following except: