Test your basic knowledge |

CISSP Crypto Domain

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Message Authentication codes; aka message integrity code; modification detection code; cryptographic checksum; generated by running message through secret key(DES CBC) MAC is the last block generated by algorithm 64 bit






2. Scrambled version of the alphabet






3. Advanced Encryption Standard






4. Authenticity - integrity - digital signatures - storing passwords.






5. Replaces bits characters and block s with differecnt values






6. Provided by mixing key values during repeated rounds of encryption






7. Upgrade to DES; Replaced by AES; takes three times longer to encrypt






8. CIA plus non repudiation






9. Provided by mixing up the location of plaintext throughout the cipher






10. Online Certificate Status Protocol- used to query the CA; useful in large; complex environments; responds to a query with status of valid; suspended; or revoked






11. Secret sequence of bits and instructions used to encrypt/decrypt






12. Certificate Authority; registration authority offloads work; validates identity; distributes key; certificate server maintains repository that stores certificates






13. Has authority to remove keys from escrow;






14. Used with keys; do not need to be encypted; required to prevent defeat of keyspace through pattern analysis






15. Encrypted data-black side






16. Rives Shamir; adleman- based on factoring of large prime numbers-encrypt-dig sig- and key exchange variable key length 512 to 4096- strong but slow; 100 times slower than software; 1000-10000 slower than hardware encryption






17. Prove knowledge of a fact to a third party without revealing the fact itself






18. Rivest-Shamir-Adleman - factorization - used for encryption - key exchange and digital signature.






19. Hides data in images - usually by LSB (least significant bit)






20. RSA; El Gamal; ECC; Diffe Hellman; DSA






21. Message Authentication Code - Symmetric enc + Hash






22. Data Encryption Standard - 64 bit blocks - 56 bit key - 16 rounds - 4 modes






23. First public key algorithm; not used for message encrypt or digital signatures; uses large prime numbers; requires both sender and reciever to have key pairs; vulnerable to man in the middle attacks






24. Storage of keys and certs for extended period of time-normally performed by CA a trusted third party; or key holder






25. Formula is public; used to creat checksums; message digests; or integrity check values






26. Rearrances the bits characters or character blocks






27. Buries a message by taking the least significant bit of evvery byte to carry the message; hide a message in another message. Graphics; sound files; alternated used in corporate espionage






28. Block based - adds padding - same key - same clear = same ciphertext






29. Credentials that allow verification; contains serial no; ident info; dig signature;lifetime dates;public key of the cert holder






30. 128 bit encryption; on 16 rounds of encryption; key size of 64 bits 8 parity; 56 bits long






31. NIST and NSA - 160 bit digest






32. Confidentiality - Authentication - Non-Repudiation






33. Integrity Check Value-makes the hash with the hash algorithm






34. Measar cipher






35. Binary operation that adds bits together; plaintext is XORed with a random keystream to generate cyphertext






36. Based on probability with 23 people 50% chance 2 will have same birthday






37. No plaintext exposure; encrypted at source; VPN; SSL ;SSH






38. Hash Mess Auth Code (512bit MD5; SHA-1); calculated using a hash function with secret key- shared key appended to data shared faster than DES CBC- used in IPSEC SSL/TLS and SSH






39. Set symbol size usually 64 bits






40. Based on diffie-hellman - encryption - digital signatures and key exchange.






41. Malled online encryption or traffic flow security- implemented in hardware' encrypts all traffic in a single path






42. Carlisle Adams and Stafford Tavares; CAST 128 64 bit block cipher-uses keys between 48 and 128 bit lengths 12 to 16 rounds of operations CAST 256 uses 48 rounds; of 128; 192; 160; 224; 256






43. Pro's: key management cons: speed/file size






44. Simple substitution - ROT-n - mono-alphabetical.






45. Data Encryption Standard (DES) 5 Block Modes; Trple DES runs through it three times; Blowfish; IDEA; RC4; RC5






46. Both parties have same key(kept secret) exchage keys before comms begins; faster than asymmetric crypto; best suited for bulk encryption; N(N-1)/2 is the number of keys needed; File Encryption Key (FEK)






47. NIST 1991 - outlines authorized algorithms






48. A specific proceedure






49. 256 or 512-bit digest






50. key storage;escrow;archival;recovery agend;multiple key pairs