SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Crypto Domain
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Integrity Check Value-makes the hash with the hash algorithm
ICV
Trap Door Function
steganography
cryptanalysis
2. Keyword: integrity
zero knowledge proof
data transmission
Hash
Diffie-Hellman Algorithm
3. Authenticity - integrity - digital signatures - storing passwords.
key mgmt tasks
AES
Hash Function Uses
Knapsack
4. Centralized key mgt key issuer; keeps copy of keys or decentralized key mgt; end user generates keys and submits to CA;does not provide for key escrow; no recovery possible
Cipher Feedback Mode
key mgmt mechanisms
frequency analysis
birthday paradox
5. Advanced Encryption Standard
Diffe Helman
RiJndael(AES)
Hash
cryptology
6. One key - only confidentiality
DES
El Gamal
transposition/permutation cipher
symetric
7. Simple substitution - ROT-n - mono-alphabetical.
Common Hash Algorithms
Key zeroization
DES CFB
caesar cipher
8. International Data Enc Algorithm - 64 bit block - 128 bit key
cryptology
symetric
HAVAL
IDEA
9. Stream cipher; stream algorithm works one bit at a time usually done in Hardware; no memory required; very fast; block cipher; works on blocks of bits; transforms into fixed length blocks; encrypted block by block 64; 128; 256 uses substitution and t
symmetric algorithms types
substitution cipher
recovery agent
SHA1
10. Based on diffie-hellman - encryption - digital signatures and key exchange.
data transmission
AES
RiJndael(AES)
El Gamal
11. No plaintext exposure; encrypted at source; VPN; SSL ;SSH
end to end enccryption
AES
Exclusive Or(XOR)
cryptology
12. Large set of possible values used to construct keys
link encryption
data transmission
message hashing
key space
13. Public algorithm - private key.
kerckhoffs principle
AES
Blowfish
zero knowledge proof
14. Rearrances the bits characters or character blocks
initialization vector/salt
AES
El Gamal
transposition/permutation cipher
15. Binary operation that adds bits together; plaintext is XORed with a random keystream to generate cyphertext
Exclusive Or(XOR)
HMAC
substitution cipher
modular mathematics
16. One-way - difficult to solve - uses factorization - private key can compute the public key
historical highlights
substitution cipher
Trap Door Function
Asymmetric Enc provides
17. Eliptical Curve Cryptography; encryption; dig signatures and key exchange;highest strength per bit of key length; most efficient;160 bit el gamal= 1024 RSA-used in wireless devices use
key archival
ECC
Signature
Stream Cipher
18. RC(x) - 32 - 64 - 128 bit blocks - key max at 2048 bits
Rivest Cipher
Electronic Code Book
link encryption
MD5
19. Different keys for encryption and decryption; two keys private and public Encrypt with private- unencrypt with privateor encrypt with public- decrypt with private. Use of private ensures non repudiation; without confidentiality-becomes the digital si
key mgmgt defined
asymmetric algorithms
Stream Cipher
transposition/permutation cipher
20. NIST 1991 - outlines authorized algorithms
Asymmetric Enc provides
DES CBC
modular mathematics
Digital Signature Standard
21. Easily transportable;cannot be initiated by something else; can be automatically time stamped;provides integrity by encrypting hash value;hash value generated with senders private key
digital signatures
algorithm
trust model types
link encryption
22. Upgrade to DES; Replaced by AES; takes three times longer to encrypt
scytale
crypto services
3DES
key space
23. A specific proceedure
vigenere cipher
Hybrid Encryption
CAST
algorithm
24. Uses Lucas functions.
LUC
RSA
collision
substitution cipher
25. Prove knowledge of a fact to a third party without revealing the fact itself
modular mathematics
hashing algorithm strengths
zero knowledge proof
asymmetric key encryption
26. SHA - RSA - Eliptical Curve (ECDSA)
Cipher Feedback Mode
concealment cipher
Digital Signature Standard Algorithms
non-repudiation
27. One time pad - random key - one use - unbreakable
vernam cipher
CAST
key mgmgt defined
data transmission
28. DES - 3des - aes - idea - two fish - rc4 - blow fish
key storage
ONE time pad problems
Symmetric Algorithms
algorithm
29. Stream based - also uses prior cypher text to seed
3DES
Signature
Cipher Feedback Mode
AES
30. Message hidden within larger context.
steganography
vigenere cipher
concealment cipher
key storage
31. Malled online encryption or traffic flow security- implemented in hardware' encrypts all traffic in a single path
link encryption
ICV
Common Hash Algorithms
cryptanalysis
32. 64 bit blocks of data; variable key lengths
data transmission
Diffe Helman
IDEA
blowfish
33. Mipher added to plaintext to encrypt
running key
Knapsack
key archival
key clustering
34. 1996 - crypto is protected in agreement.
symetric
scytale
Lucifer
wassenaar arrangement
35. Set of mathmatical rules used in encryption
hashing algorithm
AES
IDEA
algorithm
36. Rivest-Shamir-Adleman - factorization - used for encryption - key exchange and digital signature.
Key zeroization
Cipher Feedback Mode
RSA
historical highlights
37. Mathematical operation performed several times on the same message block
rounds
OCSP
symmetric Crypto
SHA2
38. Numeric seeding value used to with a symmetric key to provide randomness
initialization vector/salt
cryptanalysis
ICV
DES OFB
39. Keys needed to decrypt cyphertext so an authorized third party can gain access
RSA
FIPS 186
symetric
key escrow
40. Pro's: key management cons: speed/file size
Public Key Infrastructure
CBC MAC
asymmetric key encryption
recovery agent
41. Carlisle Adams and Stafford Tavares; CAST 128 64 bit block cipher-uses keys between 48 and 128 bit lengths 12 to 16 rounds of operations CAST 256 uses 48 rounds; of 128; 192; 160; 224; 256
Lucifer
birthday paradox
CAST
symetric
42. Similar to OFB-insteat of a static IV- a counter is incremented with each data block ;each block XORed with unique keystream value; no chaining; encryption of block s can happen in parallel used in IPSEc and implemented in 802.11i wireless
DES CTR
hashing algorithm strengths
CAST
cryptovariable
43. When a hash fuunction generates same output for same input
collision
caesar cipher
3DES
IDEA
44. Block based - adds padding - same key - same clear = same ciphertext
key space
one time pad
Electronic Code Book
IDEA
45. Encrypted data-black side
key mgmt tasks
cert contents
Signature
ciphertext
46. Provided by mixing key values during repeated rounds of encryption
running key
algorithm
Signature
confusion
47. Science of breakin the code
Public Key Infrastructure
Electronic Code Book
cryptanalysis
steganography
48. Integrity
message hashing
key mgmt tasks
Diffe Helman
DES CFB
49. Cipher Feedback Emulates stream cipher data encrypted in smaller units than block size; plaintext pattersn concealed in XOR; previous ciphertext block is encrypted and output produced is conbined with plaintext block using XOR-to produce next ciphert
ECC
cryptography
DES CFB
Signature
50. Letters represented by numerical place in the alphabet
modular mathematics
wassenaar arrangement
4 O's
ciphertext