Test your basic knowledge |

CISSP Crypto Domain

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. First public key exchange system - users exchange keys over insecure medium.






2. Data in readable format- red side






3. Process of properly destroying keys at end of userful loife






4. Stream based - also uses prior cypher text to seed






5. Centralized key mgt key issuer; keeps copy of keys or decentralized key mgt; end user generates keys and submits to CA;does not provide for key escrow; no recovery possible






6. Storage of keys and certs for extended period of time-normally performed by CA a trusted third party; or key holder






7. Replaces bits characters and block s with differecnt values






8. Rearranges bits or bytes






9. Science of protecting information by encoding it






10. Set symbol size usually 64 bits






11. One-way - difficult to solve - uses factorization - private key can compute the public key






12. variable block and key sizes 128; 192; 256; uses a variable number of rounds; has low memory requirements; easy to defend against timing attacks; implemented in software; hardware is costly.






13. Easily transportable;cannot be initiated by something else; can be automatically time stamped;provides integrity by encrypting hash value;hash value generated with senders private key






14. Credentials that allow verification; contains serial no; ident info; dig signature;lifetime dates;public key of the cert holder






15. Buries a message by taking the least significant bit of evvery byte to carry the message; hide a message in another message. Graphics; sound files; alternated used in corporate espionage






16. Prove knowledge of a fact to a third party without revealing the fact itself






17. Cannot deny ownership / origination.






18. Large set of possible values used to construct keys






19. When a hash fuunction generates same output for same input






20. Spartans - wrapped around rod.






21. Symmetric for Bulk Encrypt; assym for key encapsulation- used in SSL; Email; key exchange






22. Message hidden within larger context.






23. 48 rounds - 2 or 3 keys - enc enc enc (EEE) - or enc dec enc (EDE)






24. Simple substitution - ROT-n - mono-alphabetical.






25. Based on probability with 23 people 50% chance 2 will have same birthday






26. Has authority to remove keys from escrow;






27. Malled online encryption or traffic flow security- implemented in hardware' encrypts all traffic in a single path






28. Scrambled version of the alphabet






29. characters are substituted or shifted






30. 32 to 448 bit key - Schneier






31. International Data Encryption Algorithm- operateson 64 bit blocks-uses 128 bit key and is faster than DES; used in PGP and other software; no successful attacks






32. Broken






33. Instance when two keys keys generate the same ciphertext from same plaintext






34. Measar cipher






35. International Data Enc Algorithm - 64 bit block - 128 bit key






36. Hash Mess Auth Code (512bit MD5; SHA-1); calculated using a hash function with secret key- shared key appended to data shared faster than DES CBC- used in IPSEC SSL/TLS and SSH






37. 256 or 512-bit digest






38. SHA - RSA - Eliptical Curve (ECDSA)






39. Secret; single; conventional; session; shared; private






40. Online Certificate Status Protocol- used to query the CA; useful in large; complex environments; responds to a query with status of valid; suspended; or revoked






41. No plaintext exposure; encrypted at source; VPN; SSL ;SSH






42. Digital signature standard; performs integrity by SHA; uses DSA; RSA;Elyp CurveDSA






43. Keyword: integrity






44. Data Encryption Standard (DES) 5 Block Modes; Trple DES runs through it three times; Blowfish; IDEA; RC4; RC5






45. NIST 1991 - outlines authorized algorithms






46. Letters represented by numerical place in the alphabet






47. Provided by mixing up the location of plaintext throughout the cipher






48. Advanced Encryption Standard






49. Polyalphabetic - substitution - 2d grid of alphabet






50. RSA