Question Bank 09 - CISSP (2024)

Q1. Which one of the following is not a goal of cryptographic systems?

A. Nonrepudiation
B. Confidentiality
C. Availability
D. Integrity

View Answer

The Correct Answer is C.

Explanation: The four goals of cryptographic systems are confidentiality, integrity, authentication, and nonrepudiation.

Q2. John recently received an electronic mail message from Bill. What cryptographic goal would need to be met to convince John that Bill was actually the sender of the message?

A. Nonrepudiation
B. Confidentiality
C. Availability
D. Integrity

View Answer

The Correct Answer is A.

Explanation: Nonrepudiation prevents the sender of a message from later denying that they sent it.

Q3. What is the length of the cryptographic key used in the Data Encryption Standard (DES) cryptosystem?

A. 56 bits
B. 128 bits
C. 192 bits
D. 256 bits

View Answer

The Correct Answer is A.

Explanation: DES uses a 56-bit key. This is considered one of the major weaknesses of this cryptosystem.

Q4. What type of cipher relies upon changing the location of characters within a message to achieve confidentiality?

A. Stream cipher
B. Transposition cipher
C. Block cipher
D. Substitution cipher

View Answer

The Correct Answer is B.

Explanation: Transposition ciphers use a variety of techniques to reorder the characters within a message.

Q5. Which one of the following is not a possible key length for the Advanced Encryption Standard Rijndael cipher?

A. 56 bits
B. 128 bits
C. 192 bits
D. 256 bits

View Answer

The Correct Answer is A.

Explanation: The Rijndael cipher allows users to select a key length of 128, 192, or 256 bits, depending upon the specific security requirements of the application.

Q6. Which one of the following is a cryptographic goal that cannot be achieved by a secret key cryptosystem?

A. Nonrepudiation
B. Confidentiality
C. Availability
D. Integrity

View Answer

The Correct Answer is A.

Explanation: Nonrepudiation requires the use of a public key cryptosystem to prevent users from falsely denying that they originated a message.

Q7. When correctly implemented, what is the only cryptosystem known to be unbreakable?

A. Transposition cipher
B. Substitution cipher
C. Advanced Encryption Standard
D. One-time pad

View Answer

The Correct Answer is D.

Explanation: Assuming that it is used properly, the one-time pad is the only known cryptosystem that is not vulnerable to attacks.

Q8. What is the output value of the mathematical function 16 mod 3?

A. 0
B. 1
C. 3
D. 5

View Answer

The Correct Answer is B.

Explanation: Option B is correct because 16 divided by 3 equals 5, with a remainder value of 1.

Q9. In the 1940s, a team of cryptanalysts from the United States successfully broke a Soviet code based upon a one-time pad in a project known as VENONA. What rule did the Soviets break that caused this failure?

A. Key values must be random.
B. Key values must be the same length as the message.
C. Key values must be used only once.
D. Key values must be protected from physical disclosure.

View Answer

The Correct Answer is A.

Explanation: The cryptanalysts from the United States discovered a pattern in the method the Soviets used to generate their one-time pads. After this pattern was discovered, much of the code was eventually broken.

Q10. Which one of the following cipher types operates on large pieces of a message rather than individual characters or bits of a message?

A. Stream cipher
B. Caesar cipher
C. Block cipher
D. ROT3 cipher

View Answer

The Correct Answer is C.

Explanation: Block ciphers operate on message “chunks” rather than on individual characters or bits. The other ciphers mentioned are all types of stream ciphers that operate on individual bits or characters of a message.

Q11. What is the minimum number of cryptographic keys required for secure two-way communications in symmetric key cryptography?

A. One
B. Two
C. Three
D. Four

View Answer

The Correct Answer is A.

Explanation: Symmetric key cryptography uses a shared secret key. All communicating parties utilize the same key for communication in any direction.

Q12. What is the minimum number of cryptographic keys required for secure two-way communications in asymmetric key cryptography?

A. One
B. Two
C. Three
D. Four

View Answer

The Correct Answer is D.

Explanation: In asymmetric (public key) cryptography, each communicating party must have a pair of public and private keys. Therefore, two-way communication between parties requires a total of four cryptographic keys (a public and private key for each user).

Q13. Which one of the following Data Encryption Standard (DES) operating modes can be used for large messages with the assurance that an error early in the encryption/decryption process won't spoil results throughout the communication?

A. Cipher Block Chaining (CBC)
B. Electronic Codebook (ECB)
C. Cipher Feedback (CFB)
D. Output Feedback (OFB)

View Answer

The Correct Answer is D.

Explanation: Cipher Block Chaining and Cipher Feedback modes will carry errors throughout the entire encryption/decryption process. Electronic Codebook (ECB) operation is not suitable for large amounts of data. Output Feedback (OFB) mode does not allow early errors to interfere with future encryption/decryption.

Q14. What encryption algorithm is used by the Clipper chip, which supports the Escrowed Encryption Standard sponsored by the U.S. government?

A. Data Encryption Standard (DES)
B. Advanced Encryption Standard (AES)
C. Skipjack
D. IDEA

View Answer

The Correct Answer is C.

Explanation: The Skipjack algorithm implemented the key escrow standard supported by the U.S. government.

Q15. What is the minimum number of cryptographic keys required to achieve a higher level of security than DES with the Triple DES algorithm?

A. 1
B. 2
C. 3
D. 4

View Answer

The Correct Answer is B.

Explanation: To achieve added security over DES, 3DES must use at least two cryptographic keys.

Q16. What approach to key escrow divides the secret key into several pieces that are distributed to independent third parties?

A. Fair Cryptosystems
B. Key Escrow Standard
C. Escrowed Encryption Standard
D. Fair Escrow

View Answer

The Correct Answer is A.

Explanation: The Fair Cryptosystems approach would have independent third parties each store a portion of the secret key and then provide them to the government upon presentation of a valid court order.

Q17. What kind of attack makes the Caesar cipher virtually unusable?

A. Meet-in-the-middle attack
B. Escrow attack
C. Frequency attack
D. Transposition attack

View Answer

The Correct Answer is C.

Explanation: The Caesar cipher (and other simple substitution ciphers) are vulnerable to frequency attacks that analyze the rate at which specific letters appear in the ciphertext.

Q18. What type of cryptosystem commonly makes use of a passage from a well-known book for the encryption key?

A. Vernam cipher
B. Running key cipher
C. Skipjack cipher
D. Twofish cipher

View Answer

The Correct Answer is B.

Explanation: Running key (or “book”) ciphers often use a passage from a commonly available book as the encryption key.

Q19. Which AES finalist makes use of prewhitening and postwhitening techniques?

A. Rijndael
B. Twofish
C. Blowfish
D. Skipjack

View Answer

The Correct Answer is B.

Explanation: The Twofish algorithm, developed by Bruce Schneier, uses prewhitening and postwhitening.

Q20. Matthew and Richard wish to communicate using symmetric cryptography but do not have a prearranged secret key. What algorithm might they use to resolve this situation?

A. DES
B. AES
C. Diffie-Hellman
D. Skipjack

View Answer

The Correct Answer is C.

Explanation: The Diffie-Hellman algorithm allows for the secure exchange of symmetric keys over an insecure medium.

Question Bank 09 - CISSP (2024)

FAQs

What is the CISSP failure rate? ›

Passing this examination is tough, and that is why you need to make sure to study properly. However, on average, 50% to 60% of candidates who give the examination pass it.

How many people pass the CISSP exam on the first try? ›

Though the pass rates for the CISSP are not publicly released, it is widely assumed that pass rates are well below 50%. The CISSP exam is designed to evaluate your deep technical and managerial competence across eight diverse domains. In other words, it's hard and there is a ton of material.

How many questions do you need to pass CISSP? ›

The exam is of six hours' duration and consists of 250 questions from eight goliath domains; the minimum requirement is 70%, and the CISSP passing score is 700 out of 1000.

How can I pass CISSP fast? ›

To prepare for the CISSP exam, study the CISSP exam outline, use official guides and online courses, join study groups, and practice with sample exams. Focus on weak areas and adjust your study plan as needed. Understanding the CISSP exam's structure isn't just a recommendation—it's essential.

Is CISSP harder than security+? ›

Yes, CISSP is generally considered more challenging than Security+ due to the topics covered, as well as its target audience. CISSP is aimed at experienced cybersecurity professionals and covers a wide range of advanced topics across eight domains.

Can I pass CISSP in 30 days? ›

One of the most common questions we hear from our students—and those considering joining us—is whether passing the notoriously difficult CISSP exam in just one month is possible. The short answer? Absolutely.

Why is the CISSP so hard to pass? ›

Wide range of topics

The CISSP exam covers an astonishingly broad array of cybersecurity domains. We're talking about everything from risk management and data governance to cryptography and networking. These domains of CISSP are part of what makes the exam so challenging.

Can you pass CISSP without experience? ›

While the ISC2 typically requires candidates to have at least five years of relevant work experience, you can still take the CISSP exam even if you don't have professional experience in the field. However, you won't earn the CISSP certification right away. Instead, you'll become an ISC2 Associate.

How many times can you fail CISSP? ›

You may attempt an ISC2 exam up to 4 times within a 12-month period for each certification program.

Is CISSP changing in 2024? ›

Every few years, the CISSP exam goes through a major update to ensure it stays aligned with the ever-evolving cybersecurity landscape. On April 15, 2024, the latest revisions went into effect after an extensive Job Task Analysis (JTA) by ISC2.

How many hours a day should I study for CISSP? ›

For something as big and as complex as the CISSP, I suggest you study at least two to three hours every day, and when I say every day, I actually mean it. It is every day. And many of my students say, “Well, I can't just find two hours in the day or three. I can't make more hours in the day than there are.”

How many CISSP members are there in the world? ›

As of July 2022, there are a whopping 156,054 CISSP members worldwide.

What is the failure rate for the CISSP exam? ›

CISSP Pass Rate & How difficult is the CISSP exam? Yes, but with proper preparation and resources this exam is passable and worthy of a CISSP certificate. The CISSP pass rate is approximately 20% . Let's have a look at the details of the CISSP certification bootcamp .

Can you pass CISSP with self study? ›

Yes, you can self-study for the CISSP exam. Many candidates choose this route due to its flexibility and the wide range of resources available for self-paced learning.

Is CISSP the hardest? ›

Certified Information Systems Security Professional (CISSP)

The CISSP certification is considered very challenging in cybersecurity. You need at least five years of experience in two out of its eight domains. You also need to pass the CISSP exam to get certified.

Is it hard to pass the CISSP? ›

Another one we hear a lot is that the CISSP exam is nearly impossible to crack on the first go. While it's true that the exam is tough, it's far from impossible. Plenty of candidates pass on their first try.

How prestigious is the CISSP? ›

Among the most prestigious and sought-after credentials are the Certified Information Systems Security Professional (CISSP) and the Certified Information Security Manager (CISM) certifications. Both credentials are highly regarded in the industry, but they cater to different professional paths.

Can a beginner pass CISSP? ›

While the ISC2 typically requires candidates to have at least five years of relevant work experience, you can still take the CISSP exam even if you don't have professional experience in the field. However, you won't earn the CISSP certification right away. Instead, you'll become an ISC2 Associate.

Top Articles
How to Top Up a Prepaid Card?
How to Withdraw Money from Your Life Insurance Policy
Dragon Age Inquisition War Table Operations and Missions Guide
Joi Databas
877-668-5260 | 18776685260 - Robocaller Warning!
Melfme
Pollen Count Central Islip
Urban Dictionary Fov
South Bend Tribune Online
C-Date im Test 2023 – Kosten, Erfahrungen & Funktionsweise
3472542504
People Portal Loma Linda
Puretalkusa.com/Amac
Water Days For Modesto Ca
Who called you from +19192464227 (9192464227): 5 reviews
10 Fun Things to Do in Elk Grove, CA | Explore Elk Grove
Juicy Deal D-Art
Catherine Christiane Cruz
Canvasdiscount Black Friday Deals
John Chiv Words Worth
Like Some Annoyed Drivers Wsj Crossword
What Equals 16
Arlington Museum of Art to show shining, shimmering, splendid costumes from Disney Archives
Enduring Word John 15
Criglist Miami
Healthy Kaiserpermanente Org Sign On
Superhot Free Online Game Unblocked
Toonkor211
Japanese Emoticons Stars
The Monitor Recent Obituaries: All Of The Monitor's Recent Obituaries
South Florida residents must earn more than $100,000 to avoid being 'rent burdened'
NIST Special Publication (SP) 800-37 Rev. 2 (Withdrawn), Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy
Bus Dublin : guide complet, tarifs et infos pratiques en 2024 !
All Things Algebra Unit 3 Homework 2 Answer Key
Western Gold Gateway
Bimar Produkte Test & Vergleich 09/2024 » GUT bis SEHR GUT
Weapons Storehouse Nyt Crossword
Nancy Pazelt Obituary
Search All of Craigslist: A Comprehensive Guide - First Republic Craigslist
Gun Mayhem Watchdocumentaries
Craigslist Com St Cloud Mn
Az Unblocked Games: Complete with ease | airSlate SignNow
Funkin' on the Heights
Sandra Sancc
Wood River, IL Homes for Sale & Real Estate
FactoryEye | Enabling data-driven smart manufacturing
Diario Las Americas Rentas Hialeah
Minute Clinic Mooresville Nc
Game Like Tales Of Androgyny
Download Twitter Video (X), Photo, GIF - Twitter Downloader
Latest Posts
Article information

Author: The Hon. Margery Christiansen

Last Updated:

Views: 5829

Rating: 5 / 5 (70 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: The Hon. Margery Christiansen

Birthday: 2000-07-07

Address: 5050 Breitenberg Knoll, New Robert, MI 45409

Phone: +2556892639372

Job: Investor Mining Engineer

Hobby: Sketching, Cosplaying, Glassblowing, Genealogy, Crocheting, Archery, Skateboarding

Introduction: My name is The Hon. Margery Christiansen, I am a bright, adorable, precious, inexpensive, gorgeous, comfortable, happy person who loves writing and wants to share my knowledge and understanding with you.