CISSP Domain 3 questions – Digital Signature

Question : What can we use digital signatures to provide? [Select all that apply]
Non-repudiation
This is Correct.
Integrity
This is Correct.
Confidentiality
This is Incorrect.
Availability
This is Incorrect.
Question : Bob is a security administrator with the federal government and wishes to choose a digital signature approach that is an approved part of the federal Digital Signature Standard under FIPS 186-4. Which one of the following encryption algorithms is not an acceptable choice for use in digital signatures?
HAVAL
This is Correct. The Digital Signature Standard approves three encryption algorithms for use in digital signatures: the Digital Signature Algorithm (DSA); the Rivest, Shamir, Adleman (RSA) algorithm; and the Elliptic Curve DSA (ECDSA) algorithm. HAVAL is a hash function, not an encryption algorithm. While hash functions are used as part of the digital signature process, they do not provide encryption.
DSA
This is Incorrect.
RSA
This is Incorrect.
ECDSA
This is Incorrect.
Question : Jane is talking to a friend and is explaining what digital signatures do. Which of these could be something that she tells her friend is one of the MAIN reasons we use digital signatures?
Integrity
This is Correct. Digital Signatures: Provides Integrity and Non-Repudiation.
Confidentiality
This is Incorrect.
Authentication
This is Incorrect.
Availability
This is Incorrect.
Question : Which one of the following algorithms is not supported by the Digital Signature Standard?
El Gamal DSA
This is Correct. The Digital Signature Standard allows federal government use of the Digital Signature Algorithm, RSA, or the Elliptic Curve DSA in conjunction with the SHA-1 hashing function to produce secure digital signatures.
ECC DSA
This is Incorrect.
RSA
This is Incorrect.
Digital Signature Algorithm
This is Incorrect.
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.