CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 3 ■ Security Architecture and Engineering (Domain 3) 57


C. Deluge
D. Preaction


  1. Susan would like to configure IPsec in a manner that provides confidentiality for the
    content of packets. What component of IPsec provides this capability?
    A. AH
    B. ESP
    C. IKE
    D. ISAKMP

  2. Which one of the following cryptographic goals protects against the risks posed when a
    device is lost or stolen?
    A. Nonrepudiation
    B. Authentication
    C. Integrity
    D. Confidentiality

  3. What logical operation is described by the truth table shown here?


Input 1 Input 2 Output
000
011
101
110

A. OR
B. AND
C. XOR
D. NOR


  1. How many bits of keying material does the Data Encryption Standard use for encrypting
    information?
    A. 5 6 bits
    B. 6 4 bits
    C. 1 28 bits
    D. 2 56 bits

Free download pdf