Test your basic knowledge |

CISSP Crypto Domain

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. RSA; El Gamal; ECC; Diffe Hellman; DSA






2. Keys needed to decrypt cyphertext so an authorized third party can gain access






3. Message Authentication codes; aka message integrity code; modification detection code; cryptographic checksum; generated by running message through secret key(DES CBC) MAC is the last block generated by algorithm 64 bit






4. Set of mathmatical rules used in encryption






5. Simple substitution - ROT-n - mono-alphabetical.






6. Link Encryption and end to end encryption






7. Setting policies; protecting keys; key recovery; responding to key compromise; keys long enough to prevent attack; cryptoperiod: key lifetimes






8. Authenticity - integrity - digital signatures - storing passwords.






9. NIST and NSA - 160 bit digest






10. Scrambled version of the alphabet






11. Block based - adds padding - same key - same clear = same ciphertext






12. Encryption - decryption - signing - verifying






13. Stream based - errors do not propagate across blocks






14. Cipher Feedback Emulates stream cipher data encrypted in smaller units than block size; plaintext pattersn concealed in XOR; previous ciphertext block is encrypted and output produced is conbined with plaintext block using XOR-to produce next ciphert






15. 128 bit encryption; on 16 rounds of encryption; key size of 64 bits 8 parity; 56 bits long






16. Provided by mixing key values during repeated rounds of encryption






17. Study of both cryptography and cryptanalysis






18. Advanced Encryption Standard






19. Credentials that allow verification; contains serial no; ident info; dig signature;lifetime dates;public key of the cert holder






20. Data Encryption Standard (DES) 5 Block Modes; Trple DES runs through it three times; Blowfish; IDEA; RC4; RC5






21. Rearranges bits or bytes






22. Cannot deny ownership / origination.






23. Secret; single; conventional; session; shared; private






24. Science of breakin the code






25. 32 to 448 bit key - Schneier






26. One-way - difficult to solve - uses factorization - private key can compute the public key






27. Letters represented by numerical place in the alphabet






28. Block based - Previous block seeds next blocks key






29. Asymmetric enc + Hash - validity of message - non repudiation






30. Prevent disclosure - privacy






31. 256 or 512-bit digest






32. Cert Revocation List- identifies Certs that are no longer recognized; maintained and updated periodically; Browsers use OCSP for updates.






33. Output feedback; emulates stream cipher; similar to CFB except qty XORed; with each plaintext block; IV used as a seed; then keystream used as IV in continuing process






34. Has authority to remove keys from escrow;






35. Secret sequence of bits and instructions used to encrypt/decrypt






36. Replaces bits characters and block s with differecnt values






37. Storage of keys and certs for extended period of time-normally performed by CA a trusted third party; or key holder






38. Formula is public; used to creat checksums; message digests; or integrity check values






39. Malled online encryption or traffic flow security- implemented in hardware' encrypts all traffic in a single path






40. Hides data in images - usually by LSB (least significant bit)






41. Digital signature standard; performs integrity by SHA; uses DSA; RSA;Elyp CurveDSA






42. No plaintext exposure; encrypted at source; VPN; SSL ;SSH






43. Science of protecting information by encoding it






44. 128 bit digest






45. Based on diffie-hellman - encryption - digital signatures and key exchange.






46. Electronic Code Book Each block encrypted independently; 64 bits at a time; using same key; given message; always same ciphertext; susceptible to plaintext attack






47. OCSP; OSPF- routing protocol; Online Vulnerability Assessment Language; Orthogonal Frequency Division Multiplexing

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


48. Certificate Authority; registration authority offloads work; validates identity; distributes key; certificate server maintains repository that stores certificates






49. Data Encryption Standard - 64 bit blocks - 56 bit key - 16 rounds - 4 modes






50. Rives Shamir; adleman- based on factoring of large prime numbers-encrypt-dig sig- and key exchange variable key length 512 to 4096- strong but slow; 100 times slower than software; 1000-10000 slower than hardware encryption