SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Crypto Domain
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Block based - Previous block seeds next blocks key
brute force attack on hashing
key space
blowfish
Cipher Block Chaining
2. Hides data in images - usually by LSB (least significant bit)
steganography
Diffe Helman
Blowfish
algorithm
3. Has authority to remove keys from escrow;
ciphertext
trust model types
recovery agent
Public Key Infrastructure
4. Based on probability with 23 people 50% chance 2 will have same birthday
hashing algorithm strengths
birthday paradox
OCSP
IDEA
5. Authentication and integrity - needed when... At rest and in transit.
rounds
signature
AES
hybrid encrypt features
6. Rearranges bits or bytes
steganography
OCSP
transposition cipher
concealment cipher
7. SHA - RSA - Eliptical Curve (ECDSA)
initialization vector/salt
AES
Digital Signature Standard Algorithms
key mgmt tasks
8. Attmpts to conceal data by hiding it; Used by placing information in objectssuch as graphics; sound files or document headers
Hash
steganography
3DES
Trap Door Function
9. Carlisle Adams and Stafford Tavares; CAST 128 64 bit block cipher-uses keys between 48 and 128 bit lengths 12 to 16 rounds of operations CAST 256 uses 48 rounds; of 128; 192; 160; 224; 256
key storage
hashing algorithm strengths
CAST
DES CFB
10. Used with keys; do not need to be encypted; required to prevent defeat of keyspace through pattern analysis
key mgmt mechanisms
cryptography
frequency analysis
initialization vector/salt
11. Uses Lucas functions.
transposition cipher
polyalphabetic
LUC
Electronic Code Book
12. Secret sequence of bits and instructions used to encrypt/decrypt
concealment cipher
4 O's
brute force attack on hashing
cryptovariable
13. Set of mathmatical rules used in encryption
algorithm
REED D asym algorithms
data transmission
Knapsack
14. Relies on finding weaknesses in the hashing algorithm
brute force attack on hashing
Rivest Cipher
FIPS 186
Elliptical Curve Cryptosystem
15. Credentials that allow verification; contains serial no; ident info; dig signature;lifetime dates;public key of the cert holder
Asymmetric uses
cert contents
3DES
ICV
16. 128 bit encryption; on 16 rounds of encryption; key size of 64 bits 8 parity; 56 bits long
transposition/permutation cipher
Lucifer
Exclusive Or(XOR)
symmetric algorithms types
17. characters are substituted or shifted
Digital Signature Standard Algorithms
substitution cipher
Asymmetric Enc provides
Block Cipher
18. Scrambled version of the alphabet
key clustering
Electronic Code Book
polyalphabetic
symetric synonyms
19. Simple substitution - ROT-n - mono-alphabetical.
historical highlights
FIPS 186
ciphertext
caesar cipher
20. One time pad - random key - one use - unbreakable
DES ECB
4 O's
substitution cipher
vernam cipher
21. 32 to 448 bit key - Schneier
running key
key mgmt mechanisms
symetric
Blowfish
22. Advanced Encryption Standard
Digital Signature Standard
caesar cipher
RiJndael(AES)
running key
23. Each pair of entities must receive in secure fashion; requires more overhead than worth; key distro challenging- sender recievermust be on the same sheet
symmetric algorithms types
ONE time pad problems
Digital Signature Standard
historical highlights
24. Stream based - also uses prior cypher text to seed
plaintext
key archival
Cipher Feedback Mode
MD5
25. Upgrade to DES; Replaced by AES; takes three times longer to encrypt
3DES
brute force attack on hashing
symmetric algorithms types
Diffe Helman
26. Similar to OFB-insteat of a static IV- a counter is incremented with each data block ;each block XORed with unique keystream value; no chaining; encryption of block s can happen in parallel used in IPSEc and implemented in 802.11i wireless
DES CTR
AES
recovery agent
concealment cipher
27. OCSP; OSPF- routing protocol; Online Vulnerability Assessment Language; Orthogonal Frequency Division Multiplexing
28. Storage of keys and certs for extended period of time-normally performed by CA a trusted third party; or key holder
key mgmt mechanisms
substitution cipher
vigenere cipher
key archival
29. Uses asymmetric to figure out a key - symmetric used for large data encryption.
Hybrid Encryption
blowfish
key mgmgt defined
Stream Cipher
30. Both parties have same key(kept secret) exchage keys before comms begins; faster than asymmetric crypto; best suited for bulk encryption; N(N-1)/2 is the number of keys needed; File Encryption Key (FEK)
cryptanalysis
RSA
symmetric Crypto
vernam cipher
31. International Data Encryption Algorithm- operateson 64 bit blocks-uses 128 bit key and is faster than DES; used in PGP and other software; no successful attacks
crypto services
Public Key Infrastructure
IDEA
Key zeroization
32. Rivest-Shamir-Adleman - factorization - used for encryption - key exchange and digital signature.
plaintext
steganography
RSA
Diffie-Hellman Algorithm
33. Operates on bits - higher speed - usually implemented in hardware.
wassenaar arrangement
DES OFB
Stream Cipher
scytale
34. Secret; single; conventional; session; shared; private
SHA1
diffusion
trust model types
symetric synonyms
35. Monsidered unbreakable- each pad made up of truly random values; used once; securely distributed- protected at sender and reciever sites
one time pad
steganography
key archival
Asymmetric uses
36. Spartans - wrapped around rod.
scytale
cryptovariable
3DES
digital signatures
37. Block based - adds padding - same key - same clear = same ciphertext
Electronic Code Book
cert contents
PKI
symmetric algorithms types
38. Rives Shamir; adleman- based on factoring of large prime numbers-encrypt-dig sig- and key exchange variable key length 512 to 4096- strong but slow; 100 times slower than software; 1000-10000 slower than hardware encryption
RSA
certificate practice statement
3DES
RSA
39. Message Authentication Code - Symmetric enc + Hash
HMAC
steganography
Knapsack
concealment cipher
40. Prove knowledge of a fact to a third party without revealing the fact itself
cryptology
CAST
DES CBC
zero knowledge proof
41. Provided by mixing up the location of plaintext throughout the cipher
Diffe Helman
kerckhoffs principle
REED D asym algorithms
diffusion
42. Encrypted data-black side
rounds
ciphertext
steganography
key storage
43. 128 bit digest
steganography
key escrow
asymmetric algorithms
MD5
44. Instance when two keys keys generate the same ciphertext from same plaintext
cryptovariable
asymmetric algorithms
Hash
key clustering
45. variable block and key sizes 128; 192; 256; uses a variable number of rounds; has low memory requirements; easy to defend against timing attacks; implemented in software; hardware is costly.
key storage
Public Key Infrastructure
key mgmt tasks
AES
46. Hardware - software - and policies (security association) -
3DES
Hybrid Encryption
asymmetric algorithms
Public Key Infrastructure
47. Function that takes a variable length string; and compresses and transforms it into a fixed length- output called a hash or message digest
hashing algorithm
Output Feedback Mode
Key zeroization
symmetric Crypto
48. Keyword: integrity
Hash
symmetric algorithms types
hybrid encrypt features
ciphertext
49. Binary operation that adds bits together; plaintext is XORed with a random keystream to generate cyphertext
frequency analysis
hybrid encrypt features
Exclusive Or(XOR)
link encryption
50. Data Encryption Standard (DES) 5 Block Modes; Trple DES runs through it three times; Blowfish; IDEA; RC4; RC5
Lucifer
symmetric algorithms types
confusion
collision