
~ 張安倫(Alan), 暫時通過CISSP考試, CCNP、MCSE、RHCE


According to Bruce Schneier, there are four general types of cryptanalytic attacks, each of which assumes that the cryptanalyst has complete knowledge of the encryption algorithm. Which of the following emphasizes that the cryptanalyst’s job is to recover the plaintext of as many messages as possible, or better yet to deduce the key (or keys) used to encrypt the messages, in order to decrypt other messages encrypted with the same keys? (Wentz QOTD)
A. Ciphertext-only attack
B. Known-plaintext attack
C. Chosen-plaintext attack
D. Chosen-ciphertext attack
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

Your company is a trusted platform module (TPM) manufacturer. Which of the following TPM features may adversely impact the market share? (Wentz QOTD)
A. Device identification (DeviceID)
B. Bulk encryption/decryption
C. Key storage on the hard drive
D. Random number generator (RNG)
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

You are configuring the cipher suites of a web server to support secure transmission. Which of the following best enforces confidentiality? (Wentz QOTD)
A. Secure Hash Algorithm-384 (SHA-384)
B. Rivest-Shamir-Adleman (RSA) key exchange
C. Elliptic Curve Diffie-Hellman Ephemeral (ECDHE)
D. Elliptic Curve Digital Signature Algorithm (ECDSA)
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

Which of the following attacks entails interfaces to a system and adversely affects the integrity property of the well-known CIA triad the most? (Wentz QOTD)
A. Salami attack
B. Pharming attack
C. SYN flood attack
D. Data diddling attack
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.


Which of the following is not a characteristic of the adversarial threat sources mentioned in the NIST generic risk model introduced in the NIST SP 800-30 R1? (Wentz QOTD)
A. Capability
B. Intent
C. Targeting
D. Range of effects
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

Your company applies digital rights management (DRM) technologies to protect creative works. Which of the following can be hindered by DRM? (Wentz QOTD)
A. Confidentiality
B. Integrity
C. Availability
D. Authenticity
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

Which of the following is not a signaling protocol used in VoIP? (Wentz QOTD)
A. H.323
B. Session Initiation Protocol (SIP)
C. Media Gateway Control Protocol (MGCP)
D.Real-time Transport Protocol (RTP)
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

You are talking to your colleague over VoIP. Which of the following best describes the variation in the delay of received packets? (Wentz QOTD)
A. Jitter
B. Latency
C. Crosstalk
D. Attenuation
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.