CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

252 Chapter 10 ■ Practice Test 2



  1. When Richard receives the message from Matthew, what key should he use to decrypt the
    message?
    A. Matthew’s public key
    B. Matthew’s private key
    C. Richard’s public key
    D. Richard’s private key

  2. Matthew would like to enhance the security of his communication by adding a digital
    signature to the message. What goal of cryptography are digital signatures intended to
    enforce?
    A. Secrecy
    B. Availability
    C. Confidentiality
    D. Nonrepudiation

  3. When Matthew goes to add the digital signature to the message, what encryption key does
    he use to create the digital signature?
    A. Matthew’s public key
    B. Matthew’s private key
    C. Richard’s public key
    D. Richard’s private key

  4. When Jim logs into a system, his password is compared to a hashed value stored in a data-
    base. What is this process?
    A. Identification
    B. Hashing
    C. Token i z at ion
    D. Authentication

  5. What is the primary advantage of decentralized access control?
    A. It provides better redundancy.
    B. It provides control of access to people closer to the resources.
    C. It is less expensive.
    D. It provides more granular control of access.

  6. Which of the following types of controls does not describe a mantrap?
    A. Deterrent
    B. Preventive
    C. Compensating
    D. Physical

Free download pdf