Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP-ISSAP All Questions

View all questions & answers for the CISSP-ISSAP exam

Exam CISSP-ISSAP topic 2 question 117 discussion

Actual exam question from ISC's CISSP-ISSAP
Question #: 117
Topic #: 2
[All CISSP-ISSAP Questions]

Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.

  • A. Block cipher
  • B. Stream cipher
  • C. Transposition cipher
  • D. Message Authentication Code
Show Suggested Answer Hide Answer
Suggested Answer: ABD 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
n00r1
10 months, 1 week ago
The techniques used by an administrator while working with symmetric encryption cryptography are: A. Block cipher B. Stream cipher Explanation: A. Block cipher: Symmetric encryption algorithms that operate on fixed-size blocks of data, encrypting and decrypting the entire block at a time. B. Stream cipher: Symmetric encryption algorithms that encrypt and decrypt data one bit or byte at a time, typically used for streaming data. C. Transposition cipher: Transposition ciphers are a type of classical cipher and not specific to symmetric encryption cryptography. D. Message Authentication Code (MAC): MAC is a technique for ensuring the integrity and authenticity of a message and is not directly related to symmetric encryption.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...