Читаем CISSP Practice полностью

The other three choices are incorrect because they are not used in the implementation of encrypting routers or secure radios. Single-chip cryptographic modules are physical embodiments in which a single IC chip may be used as a standalone module or may be embedded within an enclosure or a product that may not be physically protected. Cryptographic modules can be implemented in software, hardware, firmware, and hybrid.

2. Regarding cryptographic modules, which of the following refers to an attack on the operations of the hardware module that does not require physical contact with components within the module?

a. Timing analysis attack

b. Noninvasive attack

c. Differential power analysis attack

d. Simple power analysis attack

2. b. A noninvasive attack can be performed on a cryptographic module without direct physical contact with the module. Non-invasive attacks attempt to compromise a cryptographic module by acquiring knowledge of the module’s critical security parameters without physically modifying or invading the module.

The other three choices are incorrect because their actions are different than a non-invasive attack. A timing analysis attack is an attack on a cryptographic module that is based on an analysis of time periods between the time a command is issued and the time the result is obtained. A differential power analysis attack considers the variations of the electrical power consumption of a cryptographic module to correlate to cryptographic keys used in a cryptographic algorithm. A simple power analysis attack considers the patterns of instruction execution to reveal the values of cryptographic keys.

3. Regarding physical security of cryptography, which of the following modules are used the most in production, implementation, and operation of adapters and expansion boards?

a. Single-chip cryptographic modules

b. Multiple-chip standalone cryptographic modules

c. Multiple-chip embedded cryptographic modules

d. Hardware cryptographic modules

3. c. Multiple-chip embedded cryptographic modules are physical embodiments in which two or more integrated circuits (IC) chips are interconnected and are embedded within an enclosure or a product that may not be physically protected. Examples of such implementations include adapters and expansion boards. Note that the security measures provided to these modules vary with the security levels of these modules.

The other three choices are incorrect because they are not used in the implementation of adapters and expansion boards. Single-chip cryptographic modules are physical embodiments in which a single IC chip may be used as a standalone module or may be embedded within an enclosure or a product that may not be physically protected. Multiple-chip standalone cryptographic modules are physical embodiments in which two or more IC chips are interconnected and the entire enclosure is physically protected. Cryptographic modules can be implemented in software, hardware, firmware, and hybrid.

4. Regarding cryptography, which of the following externally indicates that the physical security of a cryptographic module was compromised?

a. Tamper attempt

b. Tamper evidence

c. Tamper detection

d. Tamper response

4. b. Tamper is an unauthorized modification that alters the proper functioning of a cryptographic module or automated information system security equipment in a manner that degrades the security or functionality it provides. Tamper evidence is the external indication that an attempt has been made to compromise the physical security of a cryptographic module. The evidence of the tamper attempt should be observable by the module operator subsequent to the attempt.

The other three choices are incorrect because do not indicate a compromise and their actions are internal. Tamper attempt means that an attacker has made a serious try to defeat the physical security of a cryptographic module. Tamper detection is the automatic determination by a cryptographic module that an attempt has been made to compromise the physical security of the module. Tamper response is the automatic action taken by a cryptographic module when a tamper attempt has been detected.

5. Which of the following are not substitutes for tamper evidence of a cryptographic module?

a. Tamper detection and tamper response

b. Tamper attempt and tamper prevention

c. Tamper prevention and tamper detection

Перейти на страницу:

Похожие книги

100 абсолютных законов успеха в бизнесе
100 абсолютных законов успеха в бизнесе

Почему одни люди преуспевают в бизнесе больше других? Почему одни предприятия процветают, в то время как другие терпят крах? Известный лектор и писатель по вопросам бизнеса нашел ответы на эти очень трудные вопросы. В своей книге он представляет набор принципов, или `универсальных законов`, которые лежат в основе успеха деловых людей всего мира. Практические рекомендации Трейси имеют вид 100 доступных для понимания и простых в применении законов, относящихся к важнейшим сферам труда и бизнеса. Он также приводит примеры из реальной жизни, которые наглядно иллюстрируют, как работает каждый из законов, а также предлагает читателю упражнения по применению этих законов в работе и жизни.

Брайан Трейси

Деловая литература / Маркетинг, PR, реклама / О бизнесе популярно / Финансы и бизнес