New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

ISC 2 Credentials SSCP ISC Study Notes

Page: 11 / 35
Total 1074 questions

Systems Security Certified Practitioner Questions and Answers

Question 41

Which of the following would best define a digital envelope?

Options:

A.

A message that is encrypted and signed with a digital certificate.

B.

A message that is signed with a secret key and encrypted with the sender's private key.

C.

A message encrypted with a secret key attached with the message. The secret key is encrypted with the public key of the receiver.

D.

A message that is encrypted with the recipient's public key and signed with the sender's private key.

Question 42

Which of the following is NOT a property of a one-way hash function?

Options:

A.

It converts a message of a fixed length into a message digest of arbitrary length.

B.

It is computationally infeasible to construct two different messages with the same digest.

C.

It converts a message of arbitrary length into a message digest of a fixed length.

D.

Given a digest value, it is computationally infeasible to find the corresponding message.

Question 43

Which of the following can best be defined as a key distribution protocol that uses hybrid encryption to convey session keys. This protocol establishes a long-term key once, and then requires no prior communication in order to establish or exchange keys on a session-by-session basis?

Options:

A.

Internet Security Association and Key Management Protocol (ISAKMP)

B.

Simple Key-management for Internet Protocols (SKIP)

C.

Diffie-Hellman Key Distribution Protocol

D.

IPsec Key exchange (IKE)

Question 44

Which type of algorithm is considered to have the highest strength per bit of key length of any of the asymmetric algorithms?

Options:

A.

Rivest, Shamir, Adleman (RSA)

B.

El Gamal

C.

Elliptic Curve Cryptography (ECC)

D.

Advanced Encryption Standard (AES)

Page: 11 / 35
Total 1074 questions