Test your basic knowledge |

CISSP Crypto Domain

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Integrity Check Value-makes the hash with the hash algorithm






2. Keyword: integrity






3. Authenticity - integrity - digital signatures - storing passwords.






4. Centralized key mgt key issuer; keeps copy of keys or decentralized key mgt; end user generates keys and submits to CA;does not provide for key escrow; no recovery possible






5. Advanced Encryption Standard






6. One key - only confidentiality






7. Simple substitution - ROT-n - mono-alphabetical.






8. International Data Enc Algorithm - 64 bit block - 128 bit key






9. Stream cipher; stream algorithm works one bit at a time usually done in Hardware; no memory required; very fast; block cipher; works on blocks of bits; transforms into fixed length blocks; encrypted block by block 64; 128; 256 uses substitution and t






10. Based on diffie-hellman - encryption - digital signatures and key exchange.






11. No plaintext exposure; encrypted at source; VPN; SSL ;SSH






12. Large set of possible values used to construct keys






13. Public algorithm - private key.






14. Rearrances the bits characters or character blocks






15. Binary operation that adds bits together; plaintext is XORed with a random keystream to generate cyphertext






16. One-way - difficult to solve - uses factorization - private key can compute the public key






17. Eliptical Curve Cryptography; encryption; dig signatures and key exchange;highest strength per bit of key length; most efficient;160 bit el gamal= 1024 RSA-used in wireless devices use






18. RC(x) - 32 - 64 - 128 bit blocks - key max at 2048 bits






19. Different keys for encryption and decryption; two keys private and public Encrypt with private- unencrypt with privateor encrypt with public- decrypt with private. Use of private ensures non repudiation; without confidentiality-becomes the digital si






20. NIST 1991 - outlines authorized algorithms






21. Easily transportable;cannot be initiated by something else; can be automatically time stamped;provides integrity by encrypting hash value;hash value generated with senders private key






22. Upgrade to DES; Replaced by AES; takes three times longer to encrypt






23. A specific proceedure






24. Uses Lucas functions.






25. Prove knowledge of a fact to a third party without revealing the fact itself






26. SHA - RSA - Eliptical Curve (ECDSA)






27. One time pad - random key - one use - unbreakable






28. DES - 3des - aes - idea - two fish - rc4 - blow fish






29. Stream based - also uses prior cypher text to seed






30. Message hidden within larger context.






31. Malled online encryption or traffic flow security- implemented in hardware' encrypts all traffic in a single path






32. 64 bit blocks of data; variable key lengths






33. Mipher added to plaintext to encrypt






34. 1996 - crypto is protected in agreement.






35. Set of mathmatical rules used in encryption






36. Rivest-Shamir-Adleman - factorization - used for encryption - key exchange and digital signature.






37. Mathematical operation performed several times on the same message block






38. Numeric seeding value used to with a symmetric key to provide randomness






39. Keys needed to decrypt cyphertext so an authorized third party can gain access






40. Pro's: key management cons: speed/file size






41. Carlisle Adams and Stafford Tavares; CAST 128 64 bit block cipher-uses keys between 48 and 128 bit lengths 12 to 16 rounds of operations CAST 256 uses 48 rounds; of 128; 192; 160; 224; 256






42. Similar to OFB-insteat of a static IV- a counter is incremented with each data block ;each block XORed with unique keystream value; no chaining; encryption of block s can happen in parallel used in IPSEc and implemented in 802.11i wireless






43. When a hash fuunction generates same output for same input






44. Block based - adds padding - same key - same clear = same ciphertext






45. Encrypted data-black side






46. Provided by mixing key values during repeated rounds of encryption






47. Science of breakin the code






48. Integrity






49. Cipher Feedback Emulates stream cipher data encrypted in smaller units than block size; plaintext pattersn concealed in XOR; previous ciphertext block is encrypted and output produced is conbined with plaintext block using XOR-to produce next ciphert






50. Letters represented by numerical place in the alphabet