SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Crypto Domain
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. RSA; El Gamal; ECC; Diffe Hellman; DSA
REED D asym algorithms
Signature
symmetric algorithms types
DES ECB
2. Keys needed to decrypt cyphertext so an authorized third party can gain access
Key zeroization
key escrow
key mgmt tasks
prime factorization
3. Message Authentication codes; aka message integrity code; modification detection code; cryptographic checksum; generated by running message through secret key(DES CBC) MAC is the last block generated by algorithm 64 bit
CBC MAC
monoalphabetic
cryptanalysis
key mgmgt defined
4. Set of mathmatical rules used in encryption
vernam cipher
Cipher Feedback Mode
message hashing
algorithm
5. Simple substitution - ROT-n - mono-alphabetical.
caesar cipher
symetric
IDEA
cryptovariable
6. Link Encryption and end to end encryption
hashing algorithm
data transmission
diffusion
Lucifer
7. Setting policies; protecting keys; key recovery; responding to key compromise; keys long enough to prevent attack; cryptoperiod: key lifetimes
RSA
vernam cipher
transposition cipher
key mgmgt defined
8. Authenticity - integrity - digital signatures - storing passwords.
monoalphabetic
zero knowledge proof
Hash Function Uses
key escrow
9. NIST and NSA - 160 bit digest
el gamal
SHA1
AES
trust model types
10. Scrambled version of the alphabet
polyalphabetic
non-repudiation
Block Cipher
ONE time pad problems
11. Block based - adds padding - same key - same clear = same ciphertext
RiJndael(AES)
Electronic Code Book
frequency analysis
Block Cipher
12. Encryption - decryption - signing - verifying
Asymmetric uses
CA
Hash Function Uses
hashing algorithm strengths
13. Stream based - errors do not propagate across blocks
IDEA
Output Feedback Mode
IDEA
symmetric algorithms types
14. Cipher Feedback Emulates stream cipher data encrypted in smaller units than block size; plaintext pattersn concealed in XOR; previous ciphertext block is encrypted and output produced is conbined with plaintext block using XOR-to produce next ciphert
DES CTR
DES CFB
OCSP
Asymmetric Enc provides
15. 128 bit encryption; on 16 rounds of encryption; key size of 64 bits 8 parity; 56 bits long
Output Feedback Mode
Lucifer
Stream Cipher
3DES
16. Provided by mixing key values during repeated rounds of encryption
birthday paradox
Electronic Code Book
confusion
ONE time pad problems
17. Study of both cryptography and cryptanalysis
3DES
cryptology
asymmetric key encryption
hashing algorithm
18. Advanced Encryption Standard
historical highlights
RiJndael(AES)
OCSP
RSA
19. Credentials that allow verification; contains serial no; ident info; dig signature;lifetime dates;public key of the cert holder
substitution cipher
cert contents
OCSP
algorithm
20. Data Encryption Standard (DES) 5 Block Modes; Trple DES runs through it three times; Blowfish; IDEA; RC4; RC5
Hybrid Encryption
symmetric algorithms types
Knapsack
non-repudiation
21. Rearranges bits or bytes
transposition cipher
symmetric algorithms types
hybrid encrypt features
AES
22. Cannot deny ownership / origination.
DES CFB
non-repudiation
one time pad
end to end enccryption
23. Secret; single; conventional; session; shared; private
digital signatures
HMAC
symetric synonyms
wassenaar arrangement
24. Science of breakin the code
blowfish
Hybrid Encryption
cryptanalysis
caesar cipher
25. 32 to 448 bit key - Schneier
cryptology
RSA
Blowfish
crypto services
26. One-way - difficult to solve - uses factorization - private key can compute the public key
substitution cipher
Trap Door Function
brute force attack on hashing
Symmetric Algorithms
27. Letters represented by numerical place in the alphabet
prime factorization
modular mathematics
El Gamal
symmetric algorithms types
28. Block based - Previous block seeds next blocks key
key storage
Cipher Block Chaining
vernam cipher
HAVAL
29. Asymmetric enc + Hash - validity of message - non repudiation
confusion
rounds
Signature
vernam cipher
30. Prevent disclosure - privacy
AES
Elliptical Curve Cryptosystem
3DES
cryptography
31. 256 or 512-bit digest
SHA2
CA
key storage
collision
32. Cert Revocation List- identifies Certs that are no longer recognized; maintained and updated periodically; Browsers use OCSP for updates.
CRL
DES CBC
ECC
key clustering
33. Output feedback; emulates stream cipher; similar to CFB except qty XORed; with each plaintext block; IV used as a seed; then keystream used as IV in continuing process
link encryption
DES OFB
Asymmetric Enc provides
vernam cipher
34. Has authority to remove keys from escrow;
IDEA
HAVAL
CBC MAC
recovery agent
35. Secret sequence of bits and instructions used to encrypt/decrypt
IDEA
Exclusive Or(XOR)
symmetric algorithms types
cryptovariable
36. Replaces bits characters and block s with differecnt values
substitution cipher
plaintext
DES OFB
Cipher Block Chaining
37. Storage of keys and certs for extended period of time-normally performed by CA a trusted third party; or key holder
digital signatures
Hash Function Uses
cryptography
key archival
38. Formula is public; used to creat checksums; message digests; or integrity check values
data transmission
HMAC
hashing algorithm strengths
3DES
39. Malled online encryption or traffic flow security- implemented in hardware' encrypts all traffic in a single path
REED D asym algorithms
link encryption
MD5
Rivest Cipher
40. Hides data in images - usually by LSB (least significant bit)
DES CBC
steganography
ECC
key archival
41. Digital signature standard; performs integrity by SHA; uses DSA; RSA;Elyp CurveDSA
hybrid encrypt features
steganography
FIPS 186
diffusion
42. No plaintext exposure; encrypted at source; VPN; SSL ;SSH
end to end enccryption
data transmission
Asymmetric Enc provides
symmetric algorithms types
43. Science of protecting information by encoding it
Hash
cryptography
hashing algorithm
kerckhoffs principle
44. 128 bit digest
MD5
blowfish
HMAC
running key
45. Based on diffie-hellman - encryption - digital signatures and key exchange.
plaintext
El Gamal
DES CFB
running key
46. Electronic Code Book Each block encrypted independently; 64 bits at a time; using same key; given message; always same ciphertext; susceptible to plaintext attack
DES ECB
Public Key Infrastructure
certificate practice statement
concealment cipher
47. OCSP; OSPF- routing protocol; Online Vulnerability Assessment Language; Orthogonal Frequency Division Multiplexing
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
48. Certificate Authority; registration authority offloads work; validates identity; distributes key; certificate server maintains repository that stores certificates
algorithm
CA
cert contents
Common Hash Algorithms
49. Data Encryption Standard - 64 bit blocks - 56 bit key - 16 rounds - 4 modes
data transmission
El Gamal
DES
trust model types
50. Rives Shamir; adleman- based on factoring of large prime numbers-encrypt-dig sig- and key exchange variable key length 512 to 4096- strong but slow; 100 times slower than software; 1000-10000 slower than hardware encryption
digital signatures
trust model types
RSA
DES CTR