List of questions
Related questions
Question 1016 - CISSP discussion
Which combination of cryptographic algorithms are compliant with Federal Information Processing Standard (FIPS) Publication 140-2 for non-legacy systems?
A.
Diffie-hellman (DH) key exchange: DH (>=2048 bits)Symmetric Key: Advanced Encryption Standard (AES) > 128 bitsDigital Signature: Rivest-Shamir-Adleman (RSA) (1024 bits)
B.
Diffie-hellman (DH) key exchange: DH (>=2048 bits)Symmetric Key: Advanced Encryption Standard (AES) > 128 bitsDigital Signature: Digital Signature Algorithm (DSA) (>=2048 bits)
C.
Diffie-hellman (DH) key exchange: DH (<= 1024 bits)Symmetric Key: BlowfishDigital Signature: Rivest-Shamir-Adleman (RSA) (>=2048 bits)
D.
Diffie-hellman (DH) key exchange: DH (>=2048 bits)Symmetric Key: Advanced Encryption Standard (AES) < 128 bitsDigital Signature: Elliptic Curve Digital Signature Algorithm (ECDSA) (>=256 bits)
Your answer:
0 comments
Sorted by
Leave a comment first