CISSP Domain 3 questions – Cipher quiz

Question 1: How are a one-time pad and a stream cipher similar?
They both XOR bits for their encryption process.
This is Correct. The individual bits in the one-time pad are used to encrypt the individual bits of the message through the XOR function, and in a stream algorithm the individual bits created by the keystream generator are used to encrypt the bits of the message through XOR also.
They are both asymmetric algorithms
This is Incorrect.
They are both vulnerable to linear frequency cryptanalysis attacks
This is Incorrect.
They are both block ciphers
This is Incorrect.
Question 2: Which of the following is a requirement for a secure Vernam cipher?
The pad must be used just one time
This is Correct. A one-time pad is a perfect encryption scheme because it is considered unbreakable if implemented properly. One of these requirements is that the pad is used only one time. It was invented by Gilbert Vernam in 1917, thus sometimes referred to as the Vernam cipher.
A symmetric key must be encrypted with an asymmetric key
This is Incorrect.
The private key must be only known to the owner
This is Incorrect.
It needs to hide the existence of a message
This is Incorrect.
Question 3: What type of cryptosystem commonly makes use of a passage from a well-known book for the encryption key?
Running key cipher
This is Correct. Running key (or “book”) ciphers often use a passage from a commonly available book as the encryption key.
Vernam cipher
This is Incorrect.
Skipjack cipher
This is Incorrect.
Twofish cipher
This is Incorrect.
Question 4: Which one of the following terms accurately describes the Caesar cipher?
Shift Cipher
This is Correct. The Caesar cipher is a shift cipher that works on a stream of text and is also a substitution cipher. It is not a block cipher or a transposition cipher. It is extremely weak as a cryptographic algorithm.
Block Cipher
This is Incorrect.
Transposition Cipher
This is Incorrect.
Strong Cipher
This is Incorrect.
Question 5: Which type of cipher is the Caesar cipher?
Mono-alphabetic substitution
This is Correct. The Caesar cipher is a mono-alphabetic substitution cipher. The Vigenere substitution is a polyalphabetic substitution.
Polyalphabetic transposition
This is Incorrect.
Polyalphabetic substitution
This is Incorrect.
Mono-alphabetic transposition
This is Incorrect.
Question 6: What type of cipher relies on changing the location of characters within a message to achieve confidentiality?
Transposition cipher
This is Correct.
Block cipher
This is Incorrect.
Substitution cipher
This is Incorrect.
Stream cipher
This is Incorrect.
Question 7: Which one of the following cipher types operates on large pieces of a message rather than individual characters or bits of a message?
Block Cipher
This is Correct. Block ciphers operate on message “chunks” rather than on individual characters or bits. The other ciphers mentioned are all types of stream ciphers that operate on individual bits or characters of a message.
Stream Cipher
This is Incorrect.
Caesar Cipher
This is Incorrect.
ROT3 cipher
This is Incorrect.
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.