SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Crypto Domain
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Prove knowledge of a fact to a third party without revealing the fact itself
symetric synonyms
AES
rounds
zero knowledge proof
2. Carlisle Adams and Stafford Tavares; CAST 128 64 bit block cipher-uses keys between 48 and 128 bit lengths 12 to 16 rounds of operations CAST 256 uses 48 rounds; of 128; 192; 160; 224; 256
AES
CAST
monoalphabetic
AES
3. Stream based - errors do not propagate across blocks
Output Feedback Mode
key mgmt tasks
digital signatures
monoalphabetic
4. International Data Encryption Algorithm- operateson 64 bit blocks-uses 128 bit key and is faster than DES; used in PGP and other software; no successful attacks
message hashing
IDEA
ONE time pad problems
initialization vector/salt
5. Has authority to remove keys from escrow;
Knapsack
symetric
scytale
recovery agent
6. variable block and key sizes 128; 192; 256; uses a variable number of rounds; has low memory requirements; easy to defend against timing attacks; implemented in software; hardware is costly.
modular mathematics
CBC MAC
LUC
AES
7. Rearranges bits or bytes
REED D asym algorithms
transposition cipher
Block Cipher
Cipher Block Chaining
8. Public Key Infrastructure- Developed to provide standards for key generation; authentication; x.509 non used with Pretty Good Privacy; good private good "web of trust"
PKI
diffusion
3DES
key mgmt tasks
9. Mipher added to plaintext to encrypt
LUC
running key
DES CFB
Blowfish
10. Cannot deny ownership / origination.
steganography
data transmission
non-repudiation
key mgmgt defined
11. First public key algorithm; not used for message encrypt or digital signatures; uses large prime numbers; requires both sender and reciever to have key pairs; vulnerable to man in the middle attacks
Diffe Helman
end to end enccryption
Hybrid Encryption
REED D asym algorithms
12. Block based - adds padding - same key - same clear = same ciphertext
RSA
Cipher Feedback Mode
link encryption
Electronic Code Book
13. Each pair of entities must receive in secure fashion; requires more overhead than worth; key distro challenging- sender recievermust be on the same sheet
signature
key escrow
ONE time pad problems
ECC
14. Keys needed to decrypt cyphertext so an authorized third party can gain access
Symmetric Algorithms
DES OFB
key escrow
caesar cipher
15. Numeric seeding value used to with a symmetric key to provide randomness
Exclusive Or(XOR)
El Gamal
RSA
initialization vector/salt
16. 48 rounds - 2 or 3 keys - enc enc enc (EEE) - or enc dec enc (EDE)
MD5
Elliptical Curve Cryptosystem
3DES
el gamal
17. 128 bit digest
DES CBC
CA
HMAC
MD5
18. MD5 - SHA1
Block Cipher
Common Hash Algorithms
one time pad
REED D asym algorithms
19. Symmetric for Bulk Encrypt; assym for key encapsulation- used in SSL; Email; key exchange
key mgmgt defined
Exclusive Or(XOR)
hybrid encrypt features
HMAC
20. Measar cipher
El Gamal
monoalphabetic
end to end enccryption
historical highlights
21. Attmpts to conceal data by hiding it; Used by placing information in objectssuch as graphics; sound files or document headers
Block Cipher
steganography
asymmetric key encryption
Cipher Block Chaining
22. Digital signature standard; performs integrity by SHA; uses DSA; RSA;Elyp CurveDSA
FIPS 186
Electronic Code Book
steganography
work factor
23. 128 bit encryption; on 16 rounds of encryption; key size of 64 bits 8 parity; 56 bits long
LUC
end to end enccryption
steganography
Lucifer
24. CIA plus non repudiation
crypto services
ciphertext
hashing algorithm
end to end enccryption
25. Setting policies; protecting keys; key recovery; responding to key compromise; keys long enough to prevent attack; cryptoperiod: key lifetimes
key mgmgt defined
initialization vector/salt
DES CTR
RiJndael(AES)
26. Study of both cryptography and cryptanalysis
cryptology
trust model types
hashing algorithm
FIPS 186
27. Broken
scytale
Knapsack
DES CFB
Hash Function Uses
28. Looks for patterns in ciphertext to discover the key.
3DES
initialization vector/salt
frequency analysis
OCSP
29. Encryption - decryption - signing - verifying
Digital Signature Standard Algorithms
hashing algorithm
Asymmetric uses
cryptography
30. NIST 1991 - outlines authorized algorithms
steganography
cert contents
cryptovariable
Digital Signature Standard
31. Pro's: key management cons: speed/file size
asymmetric key encryption
algorithm
Public Key Infrastructure
ICV
32. When a hash fuunction generates same output for same input
symmetric Crypto
collision
Digital Signature Standard Algorithms
key escrow
33. Secret; single; conventional; session; shared; private
Cipher Block Chaining
DES
collision
symetric synonyms
34. Buries a message by taking the least significant bit of evvery byte to carry the message; hide a message in another message. Graphics; sound files; alternated used in corporate espionage
Digital Signature Standard
steganography
digital signatures
key mgmt tasks
35. Message Authentication Code - Symmetric enc + Hash
CA
HMAC
4 O's
asymmetric algorithms
36. key storage;escrow;archival;recovery agend;multiple key pairs
DES ECB
key mgmt tasks
ECC
modular mathematics
37. Advanced Encryption Standard
key escrow
DES ECB
caesar cipher
RiJndael(AES)
38. Integrity Check Value-makes the hash with the hash algorithm
historical highlights
symetric
DES CTR
ICV
39. OCSP; OSPF- routing protocol; Online Vulnerability Assessment Language; Orthogonal Frequency Division Multiplexing
40. Set symbol size usually 64 bits
Block Cipher
REED D asym algorithms
message hashing
CAST
41. Message hidden within larger context.
hashing algorithm
concealment cipher
3DES
IDEA
42. Credentials that allow verification; contains serial no; ident info; dig signature;lifetime dates;public key of the cert holder
cert contents
Public Key Infrastructure
3DES
one time pad
43. Hides data in images - usually by LSB (least significant bit)
DES CTR
steganography
vernam cipher
cert contents
44. NIST and NSA - 160 bit digest
caesar cipher
Block Cipher
3DES
SHA1
45. Data Encryption Standard - 64 bit blocks - 56 bit key - 16 rounds - 4 modes
key clustering
DES
concealment cipher
steganography
46. Process of properly destroying keys at end of userful loife
Key zeroization
Block Cipher
ICV
confusion
47. Block based - Previous block seeds next blocks key
steganography
Electronic Code Book
AES
Cipher Block Chaining
48. Integrity
message hashing
confusion
Lucifer
plaintext
49. Uses Lucas functions.
concealment cipher
HAVAL
LUC
RiJndael(AES)
50. Based on diffie-hellman - encryption - digital signatures and key exchange.
recovery agent
FIPS 186
El Gamal
RSA