Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
Certified Information Systems Security Professional (CISSP)
Quiz 4: Engineering
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
Multiple Choice
There are two commonly used modes of encryption implementations. Which mode does not encrypt parameters that different link devices use to synchronize communication methods?
Question 42
Multiple Choice
There are two commonly used modes of encryption implantations. Which mode of encryption implementation enables attackers to learn about a captured packet and where it is headed?
Question 43
Multiple Choice
What algorithm enables two systems to exchange a symmetric key securely without requiring a previous relationship?
Question 44
Multiple Choice
Jack is happy that he has not had to pay for e-mail security since 1991 because of Phil Zimmerman. What email security does Jack use?
Question 45
Multiple Choice
Jeff keeps trying to successfully attack against an algorithm that has yet to be successfully attacked. What algorithm is Jeff attempting to attack?
Question 46
Multiple Choice
Cryptography is really an issue of mathematics being used to create code into an undecipherable form or algorithms. What algorithm is easier to perform than to decipher?
Question 47
Multiple Choice
Cryptography is really an issue of mathematics being used to create code into an undecipherable form or algorithms. Which algorithm is the most efficient, is mathematically rich, and uses the least resources?
Question 48
Multiple Choice
Cryptography is really an issue of mathematics being used to put code into an undecipherable form or algorithms. Which algorithm takes a variable-length string and message and produces a fixed-length value?
Question 49
Multiple Choice
What prevents a pattern in Cipher Block Chaining mode by taking the value of one block and adding it to the next block value within the algorithm?
Question 50
Multiple Choice
Often, information security experts just focus on attacks through a port, modem, or wireless access port and overlook the possibility of physical attacks. What would be considered a physical attack?
Question 51
Multiple Choice
Peter has been hired by XYZ Corp. to design their new building. Peter is an expert in environmental design and crime. What discipline is practiced by Peter?
Question 52
Multiple Choice
Environmental risks are always at hand and human behavior is unpredictable. What is usually the first line of defense?
Question 53
Multiple Choice
Crime Prevention through Environmental Design (CPTED) professionals have three main strategies to protect properties. Which is not one of them?
Question 54
Multiple Choice
What should not be used in protected areas and are used to create barriers between areas?
Question 55
Multiple Choice
Electric power is necessary for modern life. Companies must understand power issues to protect their computer systems. When clean power is used, there is no interference or voltage fluctuation. What is the proper term for line noise?