Chapter 3 ■ Security Architecture and Engineering (Domain 3) 57
C. Deluge
D. Preaction
- Susan would like to configure IPsec in a manner that provides confidentiality for the
content of packets. What component of IPsec provides this capability?
A. AH
B. ESP
C. IKE
D. ISAKMP - Which one of the following cryptographic goals protects against the risks posed when a
device is lost or stolen?
A. Nonrepudiation
B. Authentication
C. Integrity
D. Confidentiality - What logical operation is described by the truth table shown here?
Input 1 Input 2 Output
000
011
101
110
A. OR
B. AND
C. XOR
D. NOR
- How many bits of keying material does the Data Encryption Standard use for encrypting
information?
A. 5 6 bits
B. 6 4 bits
C. 1 28 bits
D. 2 56 bits