100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CISSP – Cryptography Exam 2026 Questions and Answers

Rating
-
Sold
-
Pages
18
Grade
A+
Uploaded on
20-10-2025
Written in
2025/2026

CISSP – Cryptography Exam 2026 Questions and Answers

Institution
CISSP
Course
CISSP










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISSP
Course
CISSP

Document information

Uploaded on
October 20, 2025
Number of pages
18
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CISSP – Cryptography Exam 2026
Questions and Answers

What is the goal of cryptanalysis?

A. To determine the strength of an algorithm

B. To increase the substitution functions in a cryptographic algorithm

C. To decrease the transposition functions in a cryptographic algorithm

D. To determine the permutations used - Correct answer-A. Cryptanalysis is the

process of trying to reverse-engineer a cryptosystem, with the possible goal of

uncovering the key used. Once this key is uncovered, all other messages encrypted

with this key can be accessed. Cryptanalysis is carried out by the white hats to test

the strength of the algorithm.

The frequency of successful brute force attacks has increased because

A. The use of permutations and transpositions in algorithms has increased.

B. As algorithms get stronger, they get less complex, and thus more susceptible to

attacks.
©COPYRIGHT 2025, ALL RIGHTS RESERVED 1

,C. Processor speed and power have increased.

D. Key length reduces over time. - Correct answer-C. A brute force attack is

resource-intensive. It tries all values until the correct one is obtained. As computers

have more powerful processors added to them, attackers can carry out more

powerful brute force attacks.

Which of the following is not a property or characteristic of a one-way hash

function?

A. It converts a message of arbitrary length into a value of fixed length.

B. Given the digest value, it should be computationally infeasible to find the

corresponding message.

C. It should be impossible or rare to derive the same digest from two different

messages.

D. It converts a message of fixed length to an arbitrary length value. - Correct

answer-D. A hashing algorithm will take a string of variable length, the message

can be any size, and compute a fixed-length value. The fixed-length value is the

message digest. The MD family creates the fixed-length value of 128 bits, and

SHA creates one of 160 bits.



©COPYRIGHT 2025, ALL RIGHTS RESERVED 2

, What would indicate that a message had been modified?

A. The public key has been altered.

B. The private key has been altered.

C. The message digest has been altered.

D. The message has been encrypted properly. - Correct answer-C. Hashing

algorithms generate message digests to detect whether modification has taken

place. The sender and receiver independently generate their own digests, and the

receiver compares these values. If they differ, the receiver knows

the message has been altered.

Which of the following is a U.S. federal government algorithm developed for

creating secure message digests?

A. Data Encryption Algorithm

B. Digital Signature Standard

C. Secure Hash Algorithm

D. Data Signature Algorithm - Correct answer-C. SHA was created to generate

secure message digests. Digital Signature Standard (DSS) is the standard to create



©COPYRIGHT 2025, ALL RIGHTS RESERVED 3
R207,22
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
TutorJessica

Document also available in package deal

Get to know the seller

Seller avatar
TutorJessica Yale University
Follow You need to be logged in order to follow users or courses
Sold
4
Member since
2 months
Number of followers
0
Documents
5082
Last sold
1 week ago
TUTOR JESSICA

Welcome to my store, here you will come across tutor verified study materials you may need for your exam preparation.

0,0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions