SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Comptia Security +: Cryptography
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Block and stream
symmetric ciphers
MIME
steganography
SSH
2. Sender/receiver share the same key - fast - provides confidentiality - key management issue
symmetric key
digital signature
SHA
DSS
3. A protocol suite for securing network connections using IKE - AH - and ESP
S/MIME
wired equivalency privacy
IPSec
four modes of DES
4. Enciphers fixed-size blocks of bits using substitution and permutation
block cipher
TKIP
lanman
cryptography
5. Provides digests in different lengths including 224 - 256 - 384 - and 512
digital signature
ciphertext
RSA
SHA-2
6. Symmetric cryptography with MAC - asymmetric cryptography - and hashes provide __________
integrity
hashing
IPSec
symmetric key algorithms
7. Encrypting a message's hash value with a private key - DOES NOT ensure confidentiality
digital signature
SHA
four modes of DES
asymmetric key algorithms
8. An algorithm developed to secure wireless that uses AES (CCMP + AES)
digital signature
WPA2
X.509
trusted platform module
9. Used by WPA - uses RC4 with IV - blocks replay attacks with packet sequence counter - replaced by WPA2
decryption
DES
S/MIME
TKIP
10. Tunneling protocol that merges PPTP with L2F - using port 1701 - is used over UDP - can be combined with IPSec for 5 layered encapsulation
wired equivalency privacy
L2TP
Hash Message Authentication Code
triple DES
11. Mechanism for message authentication that uses one of two algorithms (SHA-1 or MDF5) in combination with a shared secret key - also known as keyed hashing
one time pad
HMAC
key
SHA
12. Based on two keys - public and private - one-way function: a key cannot decrypt what it encrypts - provides confidentiality - authentication - integrity - and nonrepudiation - Discovered by Diffie and Hellman - also known as public key
Hash Message Authentication Code
one time pad
asymmetric key
SSL
13. A cryptographic communications protocol at the transport layer that provides public key encryption (RSA or Diffie-Helman) - data encryption (IDEA - DES - 3DES) - server authentication - message integrity (MD5 or SHA-1) - and client authentication.
transport layer security
SHA
TKIP
SSL
14. An algorithm developed to secure wireless - improperly implemented RC4 - only had a 40 bit key
cipher
wired equivalency privacy
X.509
Message Authentication Code
15. PKI standard
MD5
integrity
X.509
SSH
16. Data encryption standard derived from IBM Lucifer algorithm - 56-bit key - 64-bit block - uses the Data Encryption Algorithm (DEA)
hashing
DES
NTLM
stream cipher
17. Common tunneling protocol integrated in Windows - works well with NAT - maybe blocked at firewall
AES
PPTP
tunneling
S/MIME
18. Method of encryption and decryption
secure hash algorithm
symmetric key
cipher
X.509
19. A cryptographic checksum used to provide integrity in symmetric key cryptography
MD5
symmetric key
Message Authentication Code
symmetric key algorithms
20. Discovering the original message using other than normal means (i.e. "breaking" the cryptosystem)
cryptanalysis
TLS
secure hash algorithms
asymmetric key algorithms
21. Impossible to find a message - given only message digest - impossible to find 2 messages that produce the same message digest
symmetric key
secure hash algorithm
encryption
tunneling
22. Based on use of one private/secret key - does NOT provide authentication or nonrepudiation - uses MAC
Message Authentication Code
symmetric key
HMAC
tunneling
23. For encrypting web communications - uses Cryptographic Messaging Syntax (CMS) to protect individual message and response
unclassified data
S-HTTP
TLS
digital signature
24. Uses symmetric key for integrity and confidentiality (bulk transaction) and asymmetric key for authentication - nonrepudiation - and key exchange
hybrid cryptosystem
IPSec
cipher
MD5
25. Unencrypted text - also called cleartext
plaintext
asymmetric key algorithms
Hash Message Authentication Code
hashing
26. Selected by NIST for cryptographic hash functions for public use - 160 bit length
symmetric key
steganography
integrity
SHA
27. Protects against removing or installing a bogus hard drive using sealing (measuring system variables - BIOS - boot sector - firmware)
one time pad
symmetric key algorithms
SHA
TPM
28. AES Encryption standard used to protect sensitive but ________ - default key 128
unclassified data
whole disk encryption
integrity
elliptic curve
29. DES - 3DES - AES - Twofish - Blowfish - IDEA - Skipjack - RC2 -RC4 - RC5 - RC6
stream cipher
symmetric key algorithms
one time pad
key
30. A special mathematical function that peforms one way encryption - popular algorithms are SHA and MD - used to verify message/file integrity and passwords
hashing
symmetric key algorithms
symmetric key
IPSec
31. Encrypting all data on a disk using common algorithms (AES) - requires a key (passpharse - USB key) in memory to decrypt disk
HTTPS
whole disk encryption
digital signature
unclassified data
32. Password storage hash for Windows XP - separates password into two 7 character parts and converts to upper case
lanman
MIME
symmetric key
S-HTTP
33. Tunneling protocol originally used on UNIX - uses port 22 - typically used for remote administration - replaces telnet and FTP
collision
symmetric ciphers
SSL
SSH
34. A cryptographic protocol that provides security for communications over networks such as the Internet - more secure that SSL
L2TP
SSH
TLS
PPTP
35. Free email security program that uses several algorithms - symmetric (IDEA) - asymmetric (RSA) and hashes (SHA1) and the web of trust
hybrid cryptosystem
transport layer security
PG
WPA2
36. Pads messages to a length of 512 bits - then compresses to generate a 128 bit hash value
TKIP
MD5
lanman
secure hash algorithm
37. Technique of encapsulating one packet of data within another type to create a secure link of transportation
hashing
SHA
stream cipher
tunneling
38. Symmetric cryptography - asymmetric cryptography - and hashes provide __________
hybrid
symmetric key
confidentiality
non repudiation
39. Provides integrity - authentication - and non-repudiation by encrypting a message digest with a private key
digital signature
HMAC
tunneling
one time pad
40. Most efficient algorithm - used for smart cards and cell phones - provides digital signatures - secure key exchange - and encryption
steganography
elliptic curve
PG
SHA-2
41. Digital signature standard that uses 2 algorithms: RSA and DSA (based on El Gamal) - both use the Secure Hash Standard (SHA-1)
DSS
PG
IPSec
unclassified data
42. SHA-1 - MD2/ MD4 - MD5 - Fasthash - Triple DES-MAC - Tiger - and RIPEMD-160
block cipher
encryption
secure hash algorithms
WPA2
43. PGP and SSH
SSH
hybrid
MIME
whole disk encryption
44. Most widely used tunneling protocol - over port 1723 - data carried in an IP tunnel over Generic Routing Encapsulation (GRE)
confidentiality
digital signature
PPTP
block cipher
45. PPTP - L2TP - IPSec - and SSH
cryptanalysis
tunneling protocols
secure hash algorithm
TLS
46. Security enhancement for MIME - provides signed (SHA-1) and encrypted (RSA and Diffe-Helman) email messasges
S/MIME
decryption
PPTP
trusted platform module
47. Runs on top of TLS on port 443 - protected against MITM attacks and creates secure connections
asymmetric key
S/MIME
tunneling protocols
HTTPS
48. Altering the form of a message to disguise its meaning
WPA2
HTTPS
cryptography
cipher
49. Cryptographic algorithm that operates on plaintext - one bit at a time - and enciphers with a random generated "key stream" using substitution
stream cipher
confidentiality
cryptanalysis
RSA
50. Two different pieces of data have the same hash value
tunneling
hybrid cryptosystem
collision
lanman