SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Crypto Domain
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Rivest-Shamir-Adleman - factorization - used for encryption - key exchange and digital signature.
end to end enccryption
Hash Function Uses
OCSP
RSA
2. Asymmetric enc + Hash - validity of message - non repudiation
steganography
transposition/permutation cipher
Symmetric Algorithms
Signature
3. Numeric seeding value used to with a symmetric key to provide randomness
El Gamal
symmetric Crypto
initialization vector/salt
end to end enccryption
4. Eliptical Curve Cryptography; encryption; dig signatures and key exchange;highest strength per bit of key length; most efficient;160 bit el gamal= 1024 RSA-used in wireless devices use
prime factorization
ECC
rounds
steganography
5. Instance when two keys keys generate the same ciphertext from same plaintext
plaintext
key clustering
DES CFB
trust model types
6. Caesar cipher - scytale - Blaise de vigenere - vernam cipher
caesar cipher
prime factorization
Digital Signature Standard Algorithms
historical highlights
7. Cipher Feedback Emulates stream cipher data encrypted in smaller units than block size; plaintext pattersn concealed in XOR; previous ciphertext block is encrypted and output produced is conbined with plaintext block using XOR-to produce next ciphert
symetric synonyms
Common Hash Algorithms
Hash Function Uses
DES CFB
8. NIST and NSA - 160 bit digest
HMAC
AES
SHA1
Trap Door Function
9. Hardware - software - and policies (security association) -
Public Key Infrastructure
HMAC
wassenaar arrangement
key escrow
10. Each pair of entities must receive in secure fashion; requires more overhead than worth; key distro challenging- sender recievermust be on the same sheet
key archival
rounds
substitution cipher
ONE time pad problems
11. Centralized key mgt key issuer; keeps copy of keys or decentralized key mgt; end user generates keys and submits to CA;does not provide for key escrow; no recovery possible
key escrow
key mgmt mechanisms
cryptovariable
DES OFB
12. RC(x) - 32 - 64 - 128 bit blocks - key max at 2048 bits
symmetric algorithms types
4 O's
Rivest Cipher
Public Key Infrastructure
13. 64 bit blocks of data; variable key lengths
Output Feedback Mode
blowfish
trust model types
CRL
14. Science of breakin the code
initialization vector/salt
recovery agent
Signature
cryptanalysis
15. RSA
collision
prime factorization
cert contents
HAVAL
16. 48 rounds - 2 or 3 keys - enc enc enc (EEE) - or enc dec enc (EDE)
certificate practice statement
3DES
Asymmetric Enc provides
DES CBC
17. Rearrances the bits characters or character blocks
initialization vector/salt
transposition/permutation cipher
concealment cipher
transposition cipher
18. Data Encryption Standard - 64 bit blocks - 56 bit key - 16 rounds - 4 modes
DES CTR
collision
Digital Signature Standard
DES
19. Pro's: key management cons: speed/file size
asymmetric key encryption
Stream Cipher
rounds
PKI
20. Binary operation that adds bits together; plaintext is XORed with a random keystream to generate cyphertext
Knapsack
Exclusive Or(XOR)
ciphertext
PKI
21. Stream based - also uses prior cypher text to seed
brute force attack on hashing
Cipher Feedback Mode
RSA
non-repudiation
22. Spartans - wrapped around rod.
Blowfish
scytale
brute force attack on hashing
Elliptical Curve Cryptosystem
23. Authentication and integrity - needed when... At rest and in transit.
signature
hashing algorithm
vigenere cipher
symmetric algorithms types
24. One key - only confidentiality
Signature
DES
symetric
Knapsack
25. Secret; single; conventional; session; shared; private
El Gamal
scytale
symetric synonyms
SHA1
26. key storage;escrow;archival;recovery agend;multiple key pairs
Stream Cipher
blowfish
trust model types
key mgmt tasks
27. Science of protecting information by encoding it
recovery agent
CAST
IDEA
cryptography
28. Based on probability with 23 people 50% chance 2 will have same birthday
birthday paradox
Rivest Cipher
PKI
symmetric Crypto
29. Link Encryption and end to end encryption
Hybrid Encryption
data transmission
el gamal
scytale
30. Online Certificate Status Protocol- used to query the CA; useful in large; complex environments; responds to a query with status of valid; suspended; or revoked
4 O's
algorithm
OCSP
key mgmgt defined
31. Has authority to remove keys from escrow;
Stream Cipher
Hash Function Uses
recovery agent
cryptanalysis
32. Encryption - decryption - signing - verifying
Asymmetric Enc provides
Asymmetric uses
DES ECB
key storage
33. Looks for patterns in ciphertext to discover the key.
frequency analysis
AES
CRL
MD5
34. Function that takes a variable length string; and compresses and transforms it into a fixed length- output called a hash or message digest
Electronic Code Book
el gamal
modular mathematics
hashing algorithm
35. When a hash fuunction generates same output for same input
cryptology
collision
steganography
DES CBC
36. Large set of possible values used to construct keys
message hashing
diffusion
HMAC
key space
37. Provided by mixing key values during repeated rounds of encryption
RSA
El Gamal
birthday paradox
confusion
38. Process of properly destroying keys at end of userful loife
Key zeroization
cryptovariable
cert contents
HMAC
39. International Data Encryption Algorithm- operateson 64 bit blocks-uses 128 bit key and is faster than DES; used in PGP and other software; no successful attacks
plaintext
certificate practice statement
IDEA
steganography
40. 32 to 448 bit key - Schneier
key archival
diffusion
DES CFB
Blowfish
41. Authenticity - integrity - digital signatures - storing passwords.
Hash Function Uses
steganography
polyalphabetic
running key
42. Provided by mixing up the location of plaintext throughout the cipher
diffusion
signature
Electronic Code Book
key storage
43. Rearranges bits or bytes
algorithm
transposition cipher
blowfish
symmetric Crypto
44. Data Encryption Standard (DES) 5 Block Modes; Trple DES runs through it three times; Blowfish; IDEA; RC4; RC5
HMAC
brute force attack on hashing
symmetric algorithms types
steganography
45. Block based - Previous block seeds next blocks key
Cipher Block Chaining
end to end enccryption
key mgmt tasks
one time pad
46. Advanced Encryption Standard - replaced DES - Rijndael based - 128 - 192 - and 256 bit keys/blocks with 10 - 12 - 14 rounds resp.
DES CBC
key mgmt tasks
key mgmgt defined
AES
47. Setting policies; protecting keys; key recovery; responding to key compromise; keys long enough to prevent attack; cryptoperiod: key lifetimes
AES
one time pad
ECC
key mgmgt defined
48. Message Authentication Code - Symmetric enc + Hash
hybrid encrypt features
HMAC
link encryption
symmetric algorithms types
49. Set symbol size usually 64 bits
Trap Door Function
caesar cipher
key storage
Block Cipher
50. Stream cipher; stream algorithm works one bit at a time usually done in Hardware; no memory required; very fast; block cipher; works on blocks of bits; transforms into fixed length blocks; encrypted block by block 64; 128; 256 uses substitution and t
Cipher Feedback Mode
Asymmetric uses
symmetric algorithms types
signature