SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Crypto Domain
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Set symbol size usually 64 bits
brute force attack on hashing
Block Cipher
symetric synonyms
rounds
2. Cert Revocation List- identifies Certs that are no longer recognized; maintained and updated periodically; Browsers use OCSP for updates.
wassenaar arrangement
Hash Function Uses
symmetric algorithms types
CRL
3. Centralized key mgt key issuer; keeps copy of keys or decentralized key mgt; end user generates keys and submits to CA;does not provide for key escrow; no recovery possible
DES CFB
cert contents
asymmetric key encryption
key mgmt mechanisms
4. Stream based - also uses prior cypher text to seed
Blowfish
Cipher Feedback Mode
key storage
algorithm
5. 128 bit digest
symmetric algorithms types
Rivest Cipher
MD5
ciphertext
6. Published document describing: howa CA is structured;which standards are used and how certs are managed
DES CTR
CAST
historical highlights
certificate practice statement
7. Rives Shamir; adleman- based on factoring of large prime numbers-encrypt-dig sig- and key exchange variable key length 512 to 4096- strong but slow; 100 times slower than software; 1000-10000 slower than hardware encryption
RSA
ICV
cryptanalysis
key storage
8. Block based - adds padding - same key - same clear = same ciphertext
4 O's
SHA2
Public Key Infrastructure
Electronic Code Book
9. Scrambled version of the alphabet
ICV
RSA
polyalphabetic
plaintext
10. No plaintext exposure; encrypted at source; VPN; SSL ;SSH
Electronic Code Book
hybrid encrypt features
end to end enccryption
cert contents
11. Pro's: key management cons: speed/file size
one time pad
AES
asymmetric key encryption
Stream Cipher
12. Instance when two keys keys generate the same ciphertext from same plaintext
ICV
Common Hash Algorithms
HMAC
key clustering
13. International Data Encryption Algorithm- operateson 64 bit blocks-uses 128 bit key and is faster than DES; used in PGP and other software; no successful attacks
ICV
asymmetric algorithms
IDEA
cryptography
14. Certificate Authority; registration authority offloads work; validates identity; distributes key; certificate server maintains repository that stores certificates
initialization vector/salt
CA
steganography
substitution cipher
15. Hardware - software - and policies (security association) -
cryptology
modular mathematics
RSA
Public Key Infrastructure
16. Rearrances the bits characters or character blocks
RSA
work factor
caesar cipher
transposition/permutation cipher
17. Data Encryption Standard (DES) 5 Block Modes; Trple DES runs through it three times; Blowfish; IDEA; RC4; RC5
DES CBC
concealment cipher
symmetric algorithms types
3DES
18. Credentials that allow verification; contains serial no; ident info; dig signature;lifetime dates;public key of the cert holder
symmetric Crypto
cert contents
Common Hash Algorithms
Symmetric Algorithms
19. Cipher Block Chaining- most common mode of DES loaded sequenctially- XORed using 64 bit initialization vector- first ciphertext XORed with next text block- since IV different;ciphertext different
plaintext
Hash
CA
DES CBC
20. First public key exchange system - users exchange keys over insecure medium.
trust model types
plaintext
Diffie-Hellman Algorithm
non-repudiation
21. Different keys for encryption and decryption; two keys private and public Encrypt with private- unencrypt with privateor encrypt with public- decrypt with private. Use of private ensures non repudiation; without confidentiality-becomes the digital si
algorithm
substitution cipher
blowfish
asymmetric algorithms
22. Public algorithm - private key.
DES ECB
HMAC
ICV
kerckhoffs principle
23. Eliptical Curve Cryptography; encryption; dig signatures and key exchange;highest strength per bit of key length; most efficient;160 bit el gamal= 1024 RSA-used in wireless devices use
end to end enccryption
symmetric Crypto
DES CBC
ECC
24. Science of protecting information by encoding it
cryptography
El Gamal
IDEA
scytale
25. Integrity Check Value-makes the hash with the hash algorithm
ICV
cryptovariable
Block Cipher
DES
26. Numeric seeding value used to with a symmetric key to provide randomness
initialization vector/salt
HMAC
AES
confusion
27. Similar to OFB-insteat of a static IV- a counter is incremented with each data block ;each block XORed with unique keystream value; no chaining; encryption of block s can happen in parallel used in IPSEc and implemented in 802.11i wireless
3DES
CRL
el gamal
DES CTR
28. Setting policies; protecting keys; key recovery; responding to key compromise; keys long enough to prevent attack; cryptoperiod: key lifetimes
DES ECB
concealment cipher
key mgmgt defined
rounds
29. 32 to 448 bit key - Schneier
concealment cipher
Digital Signature Standard
hashing algorithm
Blowfish
30. characters are substituted or shifted
recovery agent
substitution cipher
3DES
Exclusive Or(XOR)
31. Stream based - errors do not propagate across blocks
ciphertext
Cipher Feedback Mode
Output Feedback Mode
symmetric algorithms types
32. Binary operation that adds bits together; plaintext is XORed with a random keystream to generate cyphertext
cryptography
caesar cipher
Exclusive Or(XOR)
Key zeroization
33. RC(x) - 32 - 64 - 128 bit blocks - key max at 2048 bits
CA
Rivest Cipher
cryptology
PKI
34. Mipher added to plaintext to encrypt
Asymmetric Enc provides
Symmetric Algorithms
running key
HMAC
35. Estimated time resources to break a cryptosystem
work factor
modular mathematics
Exclusive Or(XOR)
CAST
36. International Data Enc Algorithm - 64 bit block - 128 bit key
IDEA
FIPS 186
monoalphabetic
Diffie-Hellman Algorithm
37. SHA - RSA - Eliptical Curve (ECDSA)
ciphertext
SHA2
algorithm
Digital Signature Standard Algorithms
38. Relies on finding weaknesses in the hashing algorithm
DES
vigenere cipher
DES CTR
brute force attack on hashing
39. 256 or 512-bit digest
SHA2
Digital Signature Standard
Cipher Block Chaining
initialization vector/salt
40. Single authority trust; heirarchal trust; web of trust; hybrid cross certificationusesd in businesses to trust each others CA's; and DISA Model Root; intermediate; leaf at the local levels
cryptography
link encryption
rounds
trust model types
41. variable block and key sizes 128; 192; 256; uses a variable number of rounds; has low memory requirements; easy to defend against timing attacks; implemented in software; hardware is costly.
AES
key mgmgt defined
DES OFB
vernam cipher
42. Provided by mixing key values during repeated rounds of encryption
confusion
Diffie-Hellman Algorithm
DES
link encryption
43. Study of both cryptography and cryptanalysis
monoalphabetic
Diffie-Hellman Algorithm
cryptology
crypto services
44. Letters represented by numerical place in the alphabet
digital signatures
modular mathematics
CA
DES OFB
45. Similar to RSA - very efficient for low end hardware/limited processing power.
concealment cipher
symmetric algorithms types
Hybrid Encryption
Elliptical Curve Cryptosystem
46. RSA; El Gamal; ECC; Diffe Hellman; DSA
initialization vector/salt
Hash
message hashing
REED D asym algorithms
47. Buries a message by taking the least significant bit of evvery byte to carry the message; hide a message in another message. Graphics; sound files; alternated used in corporate espionage
hashing algorithm strengths
steganography
Blowfish
key space
48. Has authority to remove keys from escrow;
symmetric algorithms types
recovery agent
Electronic Code Book
data transmission
49. A specific proceedure
RiJndael(AES)
algorithm
Elliptical Curve Cryptosystem
Lucifer
50. Science of breakin the code
Diffie-Hellman Algorithm
cryptanalysis
recovery agent
Cipher Block Chaining