Q: 1
What is the name of a one way transformation of a string of characters into a usually shorter fixed-
length value or key that represents the original string? Such a transformation cannot be reversed?
Options
Discussion
C/D? This is a classic exam term so I'd check the official book or an ISC2 practice test for the exact wording just to be sure. I think it's A, one-way hash, but if anyone disagrees let me know.
Its C since transposition can make data unreadable without the key, so seems one-way unless you know it.
Nah, not B, it's A here. DES is reversible (symmetric encryption), so it doesn't match the "cannot be reversed" part.
That matches the definition of a hash, so A.
Be respectful. No spam.
Q: 2
A multinational corporation has detected unusual activity suggesting that an attacker has gained access
to the hypervisor layer of their virtual environment. What is the most critical immediate step the security
team should take to mitigate the threat?
Options
Discussion
C imo. Cutting the hypervisor off the network is key for containment before anything else.
Be respectful. No spam.
Q: 3
What is the primary role of smartcards in a PKI?
Options
Discussion
C
Not C, D. Pretty clear question, good wording on the options.
Be respectful. No spam.
Q: 4
Which of the following services is NOT provided by the digital signature standard (DSS)?
Options
Discussion
I don't think it's D. A is correct here. DSS doesn't actually do encryption, just handles signatures for integrity and authentication. I remember a similar question came up in my practice set. Let me know if anyone picked something else, but pretty sure it's A.
Had something like this in a mock recently, pretty clear it's A.
B , digital signatures (DSS) mainly handle integrity, authentication, and non-repudiation, but never encryption. Encryption is a classic trap here because some underlying cryptosystems (like RSA) can do both, but DSS standard is strictly for digital signatures. The confusion comes from the overlap in algorithms, not in the service provided. Anyone see a reason B or D could fit? I'm pretty sure A.
Its A, DSS never actually encrypts data. Integrity and authentication can throw people off here if you skim too fast.
A for sure. DSS covers digital signatures for integrity and authentication but doesn't offer encryption functionality. It's all about verifying sender and message-not hiding the contents. Anyone disagree?
Encryption isn't part of DSS, so A is right. DSS deals with signing, not making data confidential. Pretty sure that's what they're testing for here.
Be respectful. No spam.
Q: 5
Which of the following is a method of multiplexing data where a communication channel is divided
into an arbitrary number of variable bit-rate digital channels or data streams. This method allocates
bandwidth dynamically to physical channels having information to transmit?
Options
Discussion
C is right for dynamic allocation, D is always fixed per channel. Not seeing how frequency division matches the question wording.
C saw a similar one on recent practice. Statistical multiplexing adjusts bandwidth on demand for variable bit rates, matches the scenario.
Be respectful. No spam.
Q: 6
What protocol is used on the Local Area Network (LAN) to obtain an IP address from it's known MAC
address?
Options
Discussion
Option A Not totally sure but I remember RARP is for getting IP from MAC. ARP works the other way, right? Can someone confirm if I'm mixing them up?
Be respectful. No spam.
Q: 7
You have been tasked to develop an effective information classification program. Which one of the
following steps should be performed first?
Options
Discussion
D
D first thing is always define the criteria for classifying info before anything else gets built.
Its A since you want to make sure whatever you classify stays accurate over time, so establishing review procedures comes first in my mind. The official guide and some practice exams push this approach too I think. Anyone disagree?
A, since setting up review procedures sounds like a logical starting point to keep classification consistent over time. Anyone else thinking A?
Be respectful. No spam.
Q: 8
Which of the following LAN topologies offers the highest availability?
Options
Discussion
I was leaning toward D, partial mesh, since it also has some redundancy and seems more scalable than a full mesh. But maybe I’m missing something about the "highest" part. Wouldn’t full mesh be overkill except in tiny setups?
Full mesh definitely gives the most redundancy since every device has a direct link to all others. If one link fails, traffic just takes another path. C is right here, that's what gives it the highest availability.
I don’t think B makes sense here. C, since full mesh has every node connected to all others. Pretty sure that matches how highest availability is usually tested, though tree/topologies come up for other network exam questions.
Be respectful. No spam.
Q: 9
Which of the following ASYMMETRIC encryption algorithms is based on the difficulty of FACTORING
LARGE NUMBERS?
Options
Discussion
C tbh, RSA is the classic one tied to factoring large numbers. El Gamal and ECC are based on discrete logs, not factoring. IDEA is symmetric anyway. Seen this pop up in a few practice sets too, always points to RSA. Correct me if I missed something.
Maybe A, had a similar question in a mock and picked El Gamal.
Be respectful. No spam.
Q: 10
What is the effective key size of DES?
Options
Discussion
Option A is correct, but only because they're asking "effective" key size. That trips people up since the actual key is 64 bits including parity. I've seen a similar question sneak in that catch before.
A seen this a lot in practice sets. Clear and straightforward question.
So if they're asking about DES's effective key size, A matches what I remember from the NIST docs. The parity bits don't contribute to the actual strength. Somebody correct me if I'm missing something!
A is it. DES uses 56 bits effectively, not the full 64 since some are parity. Pretty sure that's what most exam reports confirm.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2