SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Crypto Domain
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Different keys for encryption and decryption; two keys private and public Encrypt with private- unencrypt with privateor encrypt with public- decrypt with private. Use of private ensures non repudiation; without confidentiality-becomes the digital si
asymmetric algorithms
cert contents
steganography
Diffie-Hellman Algorithm
2. characters are substituted or shifted
MD5
certificate practice statement
substitution cipher
confusion
3. Authenticity - integrity - digital signatures - storing passwords.
El Gamal
Hash Function Uses
key clustering
Digital Signature Standard
4. Rives Shamir; adleman- based on factoring of large prime numbers-encrypt-dig sig- and key exchange variable key length 512 to 4096- strong but slow; 100 times slower than software; 1000-10000 slower than hardware encryption
key mgmt mechanisms
HMAC
Cipher Block Chaining
RSA
5. Set symbol size usually 64 bits
ciphertext
DES OFB
Block Cipher
brute force attack on hashing
6. Rearranges bits or bytes
SHA2
polyalphabetic
key space
transposition cipher
7. Science of protecting information by encoding it
Digital Signature Standard
cryptanalysis
substitution cipher
cryptography
8. Confidentiality - Authentication - Non-Repudiation
ECC
confusion
Trap Door Function
Asymmetric Enc provides
9. Provided by mixing up the location of plaintext throughout the cipher
diffusion
DES
non-repudiation
Electronic Code Book
10. RC(x) - 32 - 64 - 128 bit blocks - key max at 2048 bits
polyalphabetic
algorithm
Rivest Cipher
asymmetric algorithms
11. Easily transportable;cannot be initiated by something else; can be automatically time stamped;provides integrity by encrypting hash value;hash value generated with senders private key
birthday paradox
Hybrid Encryption
digital signatures
symmetric algorithms types
12. Integrity Check Value-makes the hash with the hash algorithm
plaintext
Key zeroization
ICV
signature
13. Integrity
message hashing
FIPS 186
HMAC
collision
14. Public Key Infrastructure- Developed to provide standards for key generation; authentication; x.509 non used with Pretty Good Privacy; good private good "web of trust"
FIPS 186
ECC
PKI
crypto services
15. Polyalphabetic - substitution - 2d grid of alphabet
vigenere cipher
Hash Function Uses
Symmetric Algorithms
Trap Door Function
16. Mipher added to plaintext to encrypt
hashing algorithm strengths
Symmetric Algorithms
running key
wassenaar arrangement
17. Mathematical operation performed several times on the same message block
key clustering
rounds
REED D asym algorithms
Rivest Cipher
18. Upgrade to DES; Replaced by AES; takes three times longer to encrypt
SHA2
3DES
cryptanalysis
Symmetric Algorithms
19. Data in readable format- red side
Diffe Helman
plaintext
asymmetric key encryption
vigenere cipher
20. Stream cipher; stream algorithm works one bit at a time usually done in Hardware; no memory required; very fast; block cipher; works on blocks of bits; transforms into fixed length blocks; encrypted block by block 64; 128; 256 uses substitution and t
symmetric algorithms types
ONE time pad problems
Knapsack
IDEA
21. Secret; single; conventional; session; shared; private
symetric synonyms
cryptovariable
key mgmt tasks
asymmetric algorithms
22. Broken
concealment cipher
LUC
Knapsack
trust model types
23. Rearrances the bits characters or character blocks
Stream Cipher
data transmission
transposition/permutation cipher
Elliptical Curve Cryptosystem
24. Caesar cipher - scytale - Blaise de vigenere - vernam cipher
IDEA
historical highlights
RSA
Hash Function Uses
25. Block based - adds padding - same key - same clear = same ciphertext
Electronic Code Book
frequency analysis
Trap Door Function
3DES
26. Advanced Encryption Standard - replaced DES - Rijndael based - 128 - 192 - and 256 bit keys/blocks with 10 - 12 - 14 rounds resp.
algorithm
ICV
AES
RiJndael(AES)
27. Estimated time resources to break a cryptosystem
frequency analysis
work factor
cryptanalysis
HAVAL
28. Both parties have same key(kept secret) exchage keys before comms begins; faster than asymmetric crypto; best suited for bulk encryption; N(N-1)/2 is the number of keys needed; File Encryption Key (FEK)
Trap Door Function
symmetric Crypto
Hash Function Uses
DES ECB
29. 128 bit digest
Cipher Feedback Mode
end to end enccryption
initialization vector/salt
MD5
30. RSA; El Gamal; ECC; Diffe Hellman; DSA
IDEA
collision
REED D asym algorithms
data transmission
31. Attmpts to conceal data by hiding it; Used by placing information in objectssuch as graphics; sound files or document headers
steganography
3DES
transposition/permutation cipher
Asymmetric uses
32. Binary operation that adds bits together; plaintext is XORed with a random keystream to generate cyphertext
collision
Public Key Infrastructure
frequency analysis
Exclusive Or(XOR)
33. Similar to RSA - very efficient for low end hardware/limited processing power.
asymmetric algorithms
Elliptical Curve Cryptosystem
Asymmetric Enc provides
PKI
34. Pro's: key management cons: speed/file size
asymmetric key encryption
work factor
ONE time pad problems
polyalphabetic
35. Keyword: integrity
AES
Hash
Asymmetric Enc provides
asymmetric algorithms
36. Credentials that allow verification; contains serial no; ident info; dig signature;lifetime dates;public key of the cert holder
Electronic Code Book
cert contents
Digital Signature Standard
DES
37. Hardware - software - and policies (security association) -
monoalphabetic
crypto services
Public Key Infrastructure
key escrow
38. Scrambled version of the alphabet
polyalphabetic
asymmetric algorithms
cryptovariable
cryptography
39. Data Encryption Standard (DES) 5 Block Modes; Trple DES runs through it three times; Blowfish; IDEA; RC4; RC5
symmetric algorithms types
steganography
running key
DES
40. Spartans - wrapped around rod.
DES ECB
frequency analysis
scytale
caesar cipher
41. Hash Mess Auth Code (512bit MD5; SHA-1); calculated using a hash function with secret key- shared key appended to data shared faster than DES CBC- used in IPSEC SSL/TLS and SSH
signature
HMAC
brute force attack on hashing
steganography
42. Operates on bits - higher speed - usually implemented in hardware.
DES
DES CBC
rounds
Stream Cipher
43. Single authority trust; heirarchal trust; web of trust; hybrid cross certificationusesd in businesses to trust each others CA's; and DISA Model Root; intermediate; leaf at the local levels
El Gamal
transposition/permutation cipher
Lucifer
trust model types
44. Provided by mixing key values during repeated rounds of encryption
symmetric algorithms types
historical highlights
concealment cipher
confusion
45. 48 rounds - 2 or 3 keys - enc enc enc (EEE) - or enc dec enc (EDE)
3DES
RiJndael(AES)
key archival
vernam cipher
46. Stream based - also uses prior cypher text to seed
hashing algorithm strengths
polyalphabetic
symmetric algorithms types
Cipher Feedback Mode
47. Cipher Block Chaining- most common mode of DES loaded sequenctially- XORed using 64 bit initialization vector- first ciphertext XORed with next text block- since IV different;ciphertext different
IDEA
Rivest Cipher
DES CBC
Exclusive Or(XOR)
48. Prevent disclosure - privacy
CA
cert contents
cryptography
key space
49. CIA plus non repudiation
symetric synonyms
4 O's
ICV
crypto services
50. NIST 1991 - outlines authorized algorithms
hashing algorithm strengths
Exclusive Or(XOR)
Digital Signature Standard
ciphertext