New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GISF Exam - Topic 4 Question 52 Discussion

Actual exam question for GIAC's GISF exam
Question #: 52
Topic #: 4
[All GISF Questions]

Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Luis
3 months ago
Wait, are we really using Block ciphers still? I thought they were old news!
upvoted 0 times
...
Norah
3 months ago
Transposition cipher? Seems a bit outdated for this.
upvoted 0 times
...
Brigette
3 months ago
Message Authentication Code? Not sure if that fits.
upvoted 0 times
...
Adelina
4 months ago
I think Stream cipher is also valid here.
upvoted 0 times
...
Estrella
4 months ago
Definitely Block cipher is a go-to for symmetric encryption!
upvoted 0 times
...
Lavonna
4 months ago
I definitely remember that MACs are used for integrity, but I'm not sure if they fit under symmetric encryption techniques.
upvoted 0 times
...
Gladys
4 months ago
I feel confident that both stream and block ciphers are valid answers, but I might be mixing up the definitions of transposition and substitution.
upvoted 0 times
...
Apolonia
4 months ago
I remember practicing with stream and block ciphers, but I can't recall if MACs are considered part of symmetric encryption.
upvoted 0 times
...
Luz
5 months ago
I think transposition ciphers are more about rearranging letters, so I'm not sure if that's really a symmetric encryption technique.
upvoted 0 times
...
Lavina
5 months ago
The key here is to focus on the core symmetric encryption algorithms like block and stream ciphers. Those are the bread and butter, so I'll make sure to select those for sure.
upvoted 0 times
...
Eugene
5 months ago
I'm a little confused - I thought the transposition cipher was more of a historical technique, not really used in modern symmetric encryption. I'll have to double-check my notes on that.
upvoted 0 times
...
Gwenn
5 months ago
Okay, let's see... Message Authentication Codes are used to verify the integrity of data, so that's definitely relevant. I'm feeling good about this question.
upvoted 0 times
...
Jerry
5 months ago
Hmm, I'm a bit unsure about the transposition cipher - is that really considered a symmetric encryption technique? I'll have to think that one through.
upvoted 0 times
...
Ronny
5 months ago
I'm pretty confident I know the answer to this one. Symmetric encryption techniques like block ciphers and stream ciphers are definitely going to be on the list.
upvoted 0 times
...
Leonida
5 months ago
Okay, I've got this. Journal entries, whether debits or credits, are used to record transactions that affect the equity account. The key is understanding how each type of journal entry impacts equity.
upvoted 0 times
...
Bette
5 months ago
I think the most efficient method is using a For loop with Auto-indexing. That's the option that seems the most straightforward and efficient to me.
upvoted 0 times
...
Theresia
10 months ago
The block cipher is the way to go. It's like building a fortress around your data - no one's getting in without the key!
upvoted 0 times
Solange
8 months ago
I agree, it provides strong protection like a fortress.
upvoted 0 times
...
Goldie
8 months ago
Block cipher is definitely the best option for securing data.
upvoted 0 times
...
Santos
8 months ago
D) Block cipher
upvoted 0 times
...
Bobbye
8 months ago
C) Stream cipher
upvoted 0 times
...
Lashon
9 months ago
B) Message Authentication Code
upvoted 0 times
...
Bulah
9 months ago
A) Transposition cipher
upvoted 0 times
...
...
Becky
10 months ago
This exam is making me feel like a secret agent. 'Choose all that apply' - it's like I'm disarming a bomb or something!
upvoted 0 times
Gail
9 months ago
D) Block cipher
upvoted 0 times
...
Buck
9 months ago
C) Stream cipher
upvoted 0 times
...
Doyle
9 months ago
B) Message Authentication Code
upvoted 0 times
...
Youlanda
10 months ago
A) Transposition cipher
upvoted 0 times
...
...
Bette
10 months ago
Transposition cipher? What is this, the Enigma machine? I'm sticking with the modern techniques, thank you very much.
upvoted 0 times
Vivan
9 months ago
Message Authentication Code is important for ensuring data integrity.
upvoted 0 times
...
Enola
9 months ago
Stream cipher is also commonly used in symmetric encryption.
upvoted 0 times
...
Fannie
10 months ago
Block cipher is a good choice for symmetric encryption.
upvoted 0 times
...
Emerson
10 months ago
I prefer modern techniques too. Transposition cipher seems outdated.
upvoted 0 times
...
...
Isidra
10 months ago
Ooh, message authentication code, that's a fancy one! I bet that'll really put the 'secure' in symmetric encryption.
upvoted 0 times
...
Katlyn
10 months ago
Hmm, I think the stream cipher and block cipher are the way to go here. Gotta keep those secrets under lock and key, you know?
upvoted 0 times
Margot
10 months ago
Definitely, those techniques help ensure data confidentiality and integrity.
upvoted 0 times
...
Zita
10 months ago
I agree, stream cipher and block cipher are essential for secure communication.
upvoted 0 times
...
...
Cordell
11 months ago
I believe C) Stream cipher can also be used for symmetric encryption.
upvoted 0 times
...
Hyman
11 months ago
I agree with Earnestine, Block cipher is definitely a technique for symmetric encryption.
upvoted 0 times
...
Earnestine
11 months ago
I think D) Block cipher can be used for symmetric encryption.
upvoted 0 times
...

Save Cancel