New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSEP Exam - Topic 4 Question 34 Discussion

Actual exam question for ISC2's ISSEP exam
Question #: 34
Topic #: 4
[All ISSEP Questions]

Which of the following types of cryptography defined by FIPS 185 describes a cryptographic

algorithm or a tool accepted by the National Security Agency for protecting sensitive, unclassified

information in the systems as stated in Section 2315 of Title 10, United States Code?

Show Suggested Answer Hide Answer
Suggested Answer: B

The types of cryptography defined by FIPS 185 are as follows:

Type I cryptography: It describes a cryptographic algorithm or a tool accepted by the National

Security Agency for protecting classified information.

Type II cryptography: It describes a cryptographic algorithm or a tool accepted by the National

Security Agency for protecting

sensitive, unclassified information in the systems as stated in Section 2315 of Title 10, United States

Code, or Section 3502(2) of Title 44, United States Code.

Type III cryptography: It describes a cryptographic algorithm or a tool accepted as a Federal

Information Processing Standard.

Type III (E) cryptography: It describes a Type III algorithm or a tool that is accepted for export from

the United States.


Contribute your Thoughts:

0/2000 characters
Brett
4 months ago
Type I is the NSA's go-to for sensitive info!
upvoted 0 times
...
Isabelle
4 months ago
Wait, are we sure about this?
upvoted 0 times
...
Jeanice
4 months ago
Type III sounds right to me.
upvoted 0 times
...
Moira
4 months ago
I thought it was Type II?
upvoted 0 times
...
Argelia
5 months ago
It's definitely Type I cryptography!
upvoted 0 times
...
Jerry
5 months ago
I’m leaning towards Type I too, but I wonder if Type III (E) could also be a contender based on its usage in certain contexts.
upvoted 0 times
...
Mariann
5 months ago
I’m not entirely sure, but I remember something about Type II being less secure than Type I. Maybe it’s not the answer?
upvoted 0 times
...
Georgiana
5 months ago
I think Type I cryptography is the right answer since it’s specifically for protecting sensitive, unclassified info as per FIPS 185.
upvoted 0 times
...
Alonzo
5 months ago
I practiced a question similar to this, and I feel like Type III cryptography was mentioned as well, but I can't recall the specifics.
upvoted 0 times
...
Anabel
5 months ago
Hmm, I'm a bit unsure about this one. I'm trying to decide between the "%%Month%%%%Day%%" and "%%MMDD%%" options. I'll need to think it through carefully.
upvoted 0 times
...
Cruz
5 months ago
Hmm, I'm a bit unsure about this one. The options seem to cover different aspects of channel management, but I'm not sure which two would be the most effective for accelerating sales. I'll need to think this through carefully.
upvoted 0 times
...
Harrison
5 months ago
I'm a bit confused by this question. I know the dpkg commands are for Debian-based systems, but I'm not 100% sure about the differences between yum and rpm. I'll have to think this through carefully before answering.
upvoted 0 times
...

Save Cancel