SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
CISSP Crypto Domain
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. NIST 1991 - outlines authorized algorithms
Digital Signature Standard
collision
Cipher Feedback Mode
ECC
2. Simple substitution - ROT-n - mono-alphabetical.
asymmetric algorithms
caesar cipher
steganography
kerckhoffs principle
3. Authentication and integrity - needed when... At rest and in transit.
end to end enccryption
REED D asym algorithms
signature
Asymmetric uses
4. Message Authentication codes; aka message integrity code; modification detection code; cryptographic checksum; generated by running message through secret key(DES CBC) MAC is the last block generated by algorithm 64 bit
Blowfish
trust model types
collision
CBC MAC
5. 48 rounds - 2 or 3 keys - enc enc enc (EEE) - or enc dec enc (EDE)
DES CFB
hashing algorithm strengths
vigenere cipher
3DES
6. A specific proceedure
Block Cipher
algorithm
cryptography
end to end enccryption
7. Data Encryption Standard - 64 bit blocks - 56 bit key - 16 rounds - 4 modes
steganography
HAVAL
DES
historical highlights
8. Numeric seeding value used to with a symmetric key to provide randomness
Symmetric Algorithms
initialization vector/salt
plaintext
birthday paradox
9. 32 to 448 bit key - Schneier
key archival
Blowfish
trust model types
ONE time pad problems
10. Polyalphabetic - substitution - 2d grid of alphabet
RSA
digital signatures
DES OFB
vigenere cipher
11. Measar cipher
monoalphabetic
HMAC
frequency analysis
symetric synonyms
12. Data in readable format- red side
symmetric Crypto
prime factorization
plaintext
RSA
13. Hardware - software - and policies (security association) -
one time pad
Hash Function Uses
Public Key Infrastructure
prime factorization
14. Looks for patterns in ciphertext to discover the key.
frequency analysis
Hash Function Uses
substitution cipher
RiJndael(AES)
15. Centralized key mgt key issuer; keeps copy of keys or decentralized key mgt; end user generates keys and submits to CA;does not provide for key escrow; no recovery possible
key mgmt mechanisms
Hash
AES
Block Cipher
16. When a hash fuunction generates same output for same input
3DES
DES CTR
collision
key escrow
17. One-way - difficult to solve - uses factorization - private key can compute the public key
data transmission
Key zeroization
birthday paradox
Trap Door Function
18. Cipher Feedback Emulates stream cipher data encrypted in smaller units than block size; plaintext pattersn concealed in XOR; previous ciphertext block is encrypted and output produced is conbined with plaintext block using XOR-to produce next ciphert
DES CFB
caesar cipher
El Gamal
Lucifer
19. RC(x) - 32 - 64 - 128 bit blocks - key max at 2048 bits
caesar cipher
message hashing
Signature
Rivest Cipher
20. NIST and NSA - 160 bit digest
steganography
confusion
vigenere cipher
SHA1
21. Hash Mess Auth Code (512bit MD5; SHA-1); calculated using a hash function with secret key- shared key appended to data shared faster than DES CBC- used in IPSEC SSL/TLS and SSH
3DES
HMAC
Stream Cipher
plaintext
22. No plaintext exposure; encrypted at source; VPN; SSL ;SSH
symetric synonyms
LUC
steganography
end to end enccryption
23. Attmpts to conceal data by hiding it; Used by placing information in objectssuch as graphics; sound files or document headers
confusion
steganography
Asymmetric Enc provides
SHA1
24. Prevent disclosure - privacy
Trap Door Function
cryptography
trust model types
Digital Signature Standard
25. Placementof a secret copy in a secure location
key storage
IDEA
key space
concealment cipher
26. Encrypted data-black side
HMAC
ciphertext
cryptovariable
SHA2
27. First public key algorithm; not used for message encrypt or digital signatures; uses large prime numbers; requires both sender and reciever to have key pairs; vulnerable to man in the middle attacks
Diffe Helman
link encryption
historical highlights
Rivest Cipher
28. Carlisle Adams and Stafford Tavares; CAST 128 64 bit block cipher-uses keys between 48 and 128 bit lengths 12 to 16 rounds of operations CAST 256 uses 48 rounds; of 128; 192; 160; 224; 256
el gamal
ECC
Rivest Cipher
CAST
29. MD5 - SHA1
substitution cipher
Symmetric Algorithms
symmetric algorithms types
Common Hash Algorithms
30. Upgrade to DES; Replaced by AES; takes three times longer to encrypt
transposition cipher
Hash
Hybrid Encryption
3DES
31. Integrity Check Value-makes the hash with the hash algorithm
ICV
Knapsack
substitution cipher
one time pad
32. Cert Revocation List- identifies Certs that are no longer recognized; maintained and updated periodically; Browsers use OCSP for updates.
3DES
polyalphabetic
CRL
substitution cipher
33. Based on diffie-hellman - encryption - digital signatures and key exchange.
key clustering
key escrow
Blowfish
El Gamal
34. Spartans - wrapped around rod.
Hybrid Encryption
scytale
Output Feedback Mode
Knapsack
35. First public key exchange system - users exchange keys over insecure medium.
brute force attack on hashing
Diffie-Hellman Algorithm
HAVAL
work factor
36. Rearranges bits or bytes
transposition cipher
key space
blowfish
DES CTR
37. Different keys for encryption and decryption; two keys private and public Encrypt with private- unencrypt with privateor encrypt with public- decrypt with private. Use of private ensures non repudiation; without confidentiality-becomes the digital si
DES OFB
initialization vector/salt
Exclusive Or(XOR)
asymmetric algorithms
38. Study of both cryptography and cryptanalysis
diffusion
crypto services
cryptology
Common Hash Algorithms
39. 1996 - crypto is protected in agreement.
wassenaar arrangement
MD5
key archival
ONE time pad problems
40. Estimated time resources to break a cryptosystem
work factor
Public Key Infrastructure
cryptology
DES OFB
41. 128 bit encryption; on 16 rounds of encryption; key size of 64 bits 8 parity; 56 bits long
Lucifer
cryptography
blowfish
AES
42. RSA
prime factorization
plaintext
Hybrid Encryption
RSA
43. Science of protecting information by encoding it
vigenere cipher
cryptography
digital signatures
steganography
44. Link Encryption and end to end encryption
one time pad
key mgmt mechanisms
data transmission
Asymmetric Enc provides
45. Advanced Encryption Standard - replaced DES - Rijndael based - 128 - 192 - and 256 bit keys/blocks with 10 - 12 - 14 rounds resp.
IDEA
Elliptical Curve Cryptosystem
AES
Digital Signature Standard Algorithms
46. variable block and key sizes 128; 192; 256; uses a variable number of rounds; has low memory requirements; easy to defend against timing attacks; implemented in software; hardware is costly.
3DES
hybrid encrypt features
IDEA
AES
47. Provided by mixing up the location of plaintext throughout the cipher
modular mathematics
certificate practice statement
Digital Signature Standard
diffusion
48. Credentials that allow verification; contains serial no; ident info; dig signature;lifetime dates;public key of the cert holder
Electronic Code Book
steganography
cert contents
initialization vector/salt
49. Based on probability with 23 people 50% chance 2 will have same birthday
wassenaar arrangement
birthday paradox
Digital Signature Standard
frequency analysis
50. Message Authentication Code - Symmetric enc + Hash
HMAC
key mgmt mechanisms
message hashing
Cipher Block Chaining