SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
CISSP Crypto Domain
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. NIST 1991 - outlines authorized algorithms
symmetric algorithms types
hybrid encrypt features
Digital Signature Standard
end to end enccryption
2. Online Certificate Status Protocol- used to query the CA; useful in large; complex environments; responds to a query with status of valid; suspended; or revoked
HMAC
Diffie-Hellman Algorithm
OCSP
link encryption
3. Authentication and integrity - needed when... At rest and in transit.
DES CTR
SHA2
wassenaar arrangement
signature
4. Prevent disclosure - privacy
ICV
3DES
asymmetric algorithms
cryptography
5. Different keys for encryption and decryption; two keys private and public Encrypt with private- unencrypt with privateor encrypt with public- decrypt with private. Use of private ensures non repudiation; without confidentiality-becomes the digital si
Trap Door Function
digital signatures
Symmetric Algorithms
asymmetric algorithms
6. Used with keys; do not need to be encypted; required to prevent defeat of keyspace through pattern analysis
one time pad
initialization vector/salt
RSA
ECC
7. Advanced Encryption Standard
data transmission
Hybrid Encryption
RiJndael(AES)
transposition/permutation cipher
8. variable block and key sizes 128; 192; 256; uses a variable number of rounds; has low memory requirements; easy to defend against timing attacks; implemented in software; hardware is costly.
LUC
symetric
wassenaar arrangement
AES
9. Binary operation that adds bits together; plaintext is XORed with a random keystream to generate cyphertext
Exclusive Or(XOR)
modular mathematics
Knapsack
substitution cipher
10. Output feedback; emulates stream cipher; similar to CFB except qty XORed; with each plaintext block; IV used as a seed; then keystream used as IV in continuing process
RiJndael(AES)
caesar cipher
DES OFB
HMAC
11. Monsidered unbreakable- each pad made up of truly random values; used once; securely distributed- protected at sender and reciever sites
one time pad
collision
Hybrid Encryption
trust model types
12. Spartans - wrapped around rod.
scytale
3DES
RSA
PKI
13. Provided by mixing up the location of plaintext throughout the cipher
El Gamal
diffusion
RSA
vernam cipher
14. One-way - difficult to solve - uses factorization - private key can compute the public key
scytale
trust model types
3DES
Trap Door Function
15. NIST and NSA - 160 bit digest
DES CBC
SHA1
symmetric algorithms types
DES CFB
16. Mipher added to plaintext to encrypt
PKI
running key
Public Key Infrastructure
plaintext
17. 32 to 448 bit key - Schneier
MD5
Blowfish
hashing algorithm
AES
18. Block based - adds padding - same key - same clear = same ciphertext
substitution cipher
recovery agent
Electronic Code Book
asymmetric key encryption
19. Secret sequence of bits and instructions used to encrypt/decrypt
trust model types
scytale
frequency analysis
cryptovariable
20. Caesar cipher - scytale - Blaise de vigenere - vernam cipher
steganography
initialization vector/salt
historical highlights
Hash
21. International Data Enc Algorithm - 64 bit block - 128 bit key
3DES
asymmetric key encryption
IDEA
hashing algorithm strengths
22. No plaintext exposure; encrypted at source; VPN; SSL ;SSH
symetric
AES
DES ECB
end to end enccryption
23. RC(x) - 32 - 64 - 128 bit blocks - key max at 2048 bits
Diffe Helman
key space
substitution cipher
Rivest Cipher
24. Formula is public; used to creat checksums; message digests; or integrity check values
HAVAL
steganography
asymmetric algorithms
hashing algorithm strengths
25. Has authority to remove keys from escrow;
cryptovariable
recovery agent
frequency analysis
HMAC
26. Based on Dif Hel; provides encrypt; dig sig; and key exchange; discrete logarithms-easy to reverse engineer; main drawback is performance- slower than other algorithms
Block Cipher
Hash Function Uses
el gamal
DES CTR
27. Storage of keys and certs for extended period of time-normally performed by CA a trusted third party; or key holder
data transmission
DES OFB
Digital Signature Standard Algorithms
key archival
28. Carlisle Adams and Stafford Tavares; CAST 128 64 bit block cipher-uses keys between 48 and 128 bit lengths 12 to 16 rounds of operations CAST 256 uses 48 rounds; of 128; 192; 160; 224; 256
CAST
Knapsack
initialization vector/salt
RSA
29. Secret; single; conventional; session; shared; private
modular mathematics
DES CTR
symetric synonyms
key mgmgt defined
30. Both parties have same key(kept secret) exchage keys before comms begins; faster than asymmetric crypto; best suited for bulk encryption; N(N-1)/2 is the number of keys needed; File Encryption Key (FEK)
ECC
work factor
vigenere cipher
symmetric Crypto
31. Confidentiality - Authentication - Non-Repudiation
Asymmetric Enc provides
cryptography
data transmission
steganography
32. Measar cipher
Elliptical Curve Cryptosystem
IDEA
Common Hash Algorithms
monoalphabetic
33. Science of protecting information by encoding it
one time pad
cryptography
Public Key Infrastructure
key mgmgt defined
34. Integrity
substitution cipher
DES CTR
message hashing
non-repudiation
35. Each pair of entities must receive in secure fashion; requires more overhead than worth; key distro challenging- sender recievermust be on the same sheet
Asymmetric Enc provides
ONE time pad problems
transposition/permutation cipher
ECC
36. Replaces bits characters and block s with differecnt values
caesar cipher
non-repudiation
OCSP
substitution cipher
37. SHA - RSA - Eliptical Curve (ECDSA)
kerckhoffs principle
symetric
Digital Signature Standard Algorithms
3DES
38. Data in readable format- red side
collision
3DES
OCSP
plaintext
39. DES - 3des - aes - idea - two fish - rc4 - blow fish
DES
wassenaar arrangement
link encryption
Symmetric Algorithms
40. 1996 - crypto is protected in agreement.
wassenaar arrangement
monoalphabetic
plaintext
steganography
41. Keys needed to decrypt cyphertext so an authorized third party can gain access
initialization vector/salt
hashing algorithm
key escrow
crypto services
42. Similar to OFB-insteat of a static IV- a counter is incremented with each data block ;each block XORed with unique keystream value; no chaining; encryption of block s can happen in parallel used in IPSEc and implemented in 802.11i wireless
Block Cipher
DES CTR
key archival
RiJndael(AES)
43. Message Authentication codes; aka message integrity code; modification detection code; cryptographic checksum; generated by running message through secret key(DES CBC) MAC is the last block generated by algorithm 64 bit
CBC MAC
collision
Hash Function Uses
Symmetric Algorithms
44. Instance when two keys keys generate the same ciphertext from same plaintext
key clustering
Stream Cipher
Trap Door Function
AES
45. Link Encryption and end to end encryption
data transmission
asymmetric algorithms
steganography
Hybrid Encryption
46. Single authority trust; heirarchal trust; web of trust; hybrid cross certificationusesd in businesses to trust each others CA's; and DISA Model Root; intermediate; leaf at the local levels
confusion
non-repudiation
trust model types
cert contents
47. Process of properly destroying keys at end of userful loife
Key zeroization
wassenaar arrangement
ciphertext
DES CFB
48. Encryption - decryption - signing - verifying
Electronic Code Book
Exclusive Or(XOR)
Asymmetric uses
hashing algorithm strengths
49. Published document describing: howa CA is structured;which standards are used and how certs are managed
4 O's
collision
Hash
certificate practice statement
50. First public key algorithm; not used for message encrypt or digital signatures; uses large prime numbers; requires both sender and reciever to have key pairs; vulnerable to man in the middle attacks
Diffe Helman
Hybrid Encryption
Electronic Code Book
Knapsack