CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

56 Chapter 3 ■ Security Architecture and Engineering (Domain 3)



  1. When Bob receives the encrypted message from Alice, what key does he use to decrypt the
    message?
    A. Alice’s public key
    B. Alice’s private key
    C. Bob’s public key
    D. Bob’s private key

  2. Which one of the following keys would Bob not possess in this scenario?
    A. Alice’s public key
    B. Alice’s private key
    C. Bob’s public key
    D. Bob’s private key

  3. Alice would also like to digitally sign the message that she sends to Bob. What key should
    she use to create the digital signature?
    A. Alice’s public key
    B. Alice’s private key
    C. Bob’s public key
    D. Bob’s private key

  4. What name is given to the random value added to a password in an attempt to defeat
    rainbow table attacks?
    A. Hash
    B. Salt
    C. Extender
    D. Rebar

  5. Which one of the following is not an attribute of a hashing algorithm?
    A. They require a cryptographic key.
    B. They are irreversible.
    C. It is very difficult to find two messages with the same hash value.
    D. They take variable-length input.

  6. What type of fire suppression system fills with water when the initial stages of a fire are
    detected and then requires a sprinkler head heat activation before dispensing water?
    A. Wet pipe
    B. Dry pipe

Free download pdf