Test your basic knowledge |

CISSP Crypto Domain

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Spartans - wrapped around rod.






2. Integrity Check Value-makes the hash with the hash algorithm






3. Hardware - software - and policies (security association) -






4. Malled online encryption or traffic flow security- implemented in hardware' encrypts all traffic in a single path






5. Data Encryption Standard (DES) 5 Block Modes; Trple DES runs through it three times; Blowfish; IDEA; RC4; RC5






6. Eliptical Curve Cryptography; encryption; dig signatures and key exchange;highest strength per bit of key length; most efficient;160 bit el gamal= 1024 RSA-used in wireless devices use






7. Rives Shamir; adleman- based on factoring of large prime numbers-encrypt-dig sig- and key exchange variable key length 512 to 4096- strong but slow; 100 times slower than software; 1000-10000 slower than hardware encryption






8. Set of mathmatical rules used in encryption






9. Numeric seeding value used to with a symmetric key to provide randomness






10. Encryption - decryption - signing - verifying






11. Polyalphabetic - substitution - 2d grid of alphabet






12. Stream cipher; stream algorithm works one bit at a time usually done in Hardware; no memory required; very fast; block cipher; works on blocks of bits; transforms into fixed length blocks; encrypted block by block 64; 128; 256 uses substitution and t






13. Output feedback; emulates stream cipher; similar to CFB except qty XORed; with each plaintext block; IV used as a seed; then keystream used as IV in continuing process






14. Integrity






15. Message Authentication Code - Symmetric enc + Hash






16. Monsidered unbreakable- each pad made up of truly random values; used once; securely distributed- protected at sender and reciever sites






17. Keys needed to decrypt cyphertext so an authorized third party can gain access






18. Letters represented by numerical place in the alphabet






19. Secret; single; conventional; session; shared; private






20. Authentication and integrity - needed when... At rest and in transit.






21. Large set of possible values used to construct keys






22. Similar to OFB-insteat of a static IV- a counter is incremented with each data block ;each block XORed with unique keystream value; no chaining; encryption of block s can happen in parallel used in IPSEc and implemented in 802.11i wireless






23. Placementof a secret copy in a secure location






24. Mathematical operation performed several times on the same message block






25. RSA






26. Both parties have same key(kept secret) exchage keys before comms begins; faster than asymmetric crypto; best suited for bulk encryption; N(N-1)/2 is the number of keys needed; File Encryption Key (FEK)






27. Process of properly destroying keys at end of userful loife






28. Prove knowledge of a fact to a third party without revealing the fact itself






29. Instance when two keys keys generate the same ciphertext from same plaintext






30. Public algorithm - private key.






31. Formula is public; used to creat checksums; message digests; or integrity check values






32. DES - 3des - aes - idea - two fish - rc4 - blow fish






33. Carlisle Adams and Stafford Tavares; CAST 128 64 bit block cipher-uses keys between 48 and 128 bit lengths 12 to 16 rounds of operations CAST 256 uses 48 rounds; of 128; 192; 160; 224; 256






34. Symmetric for Bulk Encrypt; assym for key encapsulation- used in SSL; Email; key exchange






35. 128 bit digest






36. RC(x) - 32 - 64 - 128 bit blocks - key max at 2048 bits






37. Science of protecting information by encoding it






38. Advanced Encryption Standard






39. Advanced Encryption Standard - replaced DES - Rijndael based - 128 - 192 - and 256 bit keys/blocks with 10 - 12 - 14 rounds resp.






40. One-way - difficult to solve - uses factorization - private key can compute the public key






41. Set symbol size usually 64 bits






42. Buries a message by taking the least significant bit of evvery byte to carry the message; hide a message in another message. Graphics; sound files; alternated used in corporate espionage






43. 48 rounds - 2 or 3 keys - enc enc enc (EEE) - or enc dec enc (EDE)






44. 32 to 448 bit key - Schneier






45. Confidentiality - Authentication - Non-Repudiation






46. Looks for patterns in ciphertext to discover the key.






47. Message Authentication codes; aka message integrity code; modification detection code; cryptographic checksum; generated by running message through secret key(DES CBC) MAC is the last block generated by algorithm 64 bit






48. NIST 1991 - outlines authorized algorithms






49. Secret sequence of bits and instructions used to encrypt/decrypt






50. Public Key Infrastructure- Developed to provide standards for key generation; authentication; x.509 non used with Pretty Good Privacy; good private good "web of trust"