SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
CISSP Crypto Domain
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Science of protecting information by encoding it
cryptography
signature
vigenere cipher
Cipher Block Chaining
2. Block based - adds padding - same key - same clear = same ciphertext
ONE time pad problems
Diffe Helman
4 O's
Electronic Code Book
3. RSA
steganography
prime factorization
cert contents
DES ECB
4. Eliptical Curve Cryptography; encryption; dig signatures and key exchange;highest strength per bit of key length; most efficient;160 bit el gamal= 1024 RSA-used in wireless devices use
algorithm
ECC
OCSP
Output Feedback Mode
5. First public key exchange system - users exchange keys over insecure medium.
symetric synonyms
CRL
Diffie-Hellman Algorithm
wassenaar arrangement
6. Set of mathmatical rules used in encryption
vigenere cipher
El Gamal
algorithm
ciphertext
7. Based on diffie-hellman - encryption - digital signatures and key exchange.
prime factorization
El Gamal
IDEA
kerckhoffs principle
8. One key - only confidentiality
certificate practice statement
symetric
wassenaar arrangement
Asymmetric uses
9. characters are substituted or shifted
substitution cipher
SHA1
Symmetric Algorithms
Signature
10. Science of breakin the code
cryptanalysis
symetric
MD5
key escrow
11. Cert Revocation List- identifies Certs that are no longer recognized; maintained and updated periodically; Browsers use OCSP for updates.
CRL
steganography
Symmetric Algorithms
DES ECB
12. International Data Enc Algorithm - 64 bit block - 128 bit key
one time pad
substitution cipher
key mgmgt defined
IDEA
13. Letters represented by numerical place in the alphabet
modular mathematics
CBC MAC
key mgmt mechanisms
work factor
14. Keys needed to decrypt cyphertext so an authorized third party can gain access
hashing algorithm strengths
Output Feedback Mode
recovery agent
key escrow
15. Cannot deny ownership / origination.
non-repudiation
steganography
collision
DES CFB
16. Link Encryption and end to end encryption
work factor
data transmission
historical highlights
OCSP
17. Estimated time resources to break a cryptosystem
brute force attack on hashing
hashing algorithm
work factor
CBC MAC
18. Based on Dif Hel; provides encrypt; dig sig; and key exchange; discrete logarithms-easy to reverse engineer; main drawback is performance- slower than other algorithms
HMAC
one time pad
el gamal
Electronic Code Book
19. Simple substitution - ROT-n - mono-alphabetical.
CBC MAC
Rivest Cipher
polyalphabetic
caesar cipher
20. Cipher Block Chaining- most common mode of DES loaded sequenctially- XORed using 64 bit initialization vector- first ciphertext XORed with next text block- since IV different;ciphertext different
AES
asymmetric key encryption
key archival
DES CBC
21. Upgrade to DES; Replaced by AES; takes three times longer to encrypt
FIPS 186
DES
3DES
monoalphabetic
22. variable block and key sizes 128; 192; 256; uses a variable number of rounds; has low memory requirements; easy to defend against timing attacks; implemented in software; hardware is costly.
AES
key mgmt mechanisms
cryptography
symetric
23. Has authority to remove keys from escrow;
REED D asym algorithms
recovery agent
symmetric algorithms types
RiJndael(AES)
24. key storage;escrow;archival;recovery agend;multiple key pairs
FIPS 186
AES
RSA
key mgmt tasks
25. Integrity Check Value-makes the hash with the hash algorithm
Block Cipher
cert contents
ciphertext
ICV
26. 128 bit encryption; on 16 rounds of encryption; key size of 64 bits 8 parity; 56 bits long
caesar cipher
Lucifer
trust model types
RiJndael(AES)
27. 64 bit blocks of data; variable key lengths
blowfish
modular mathematics
kerckhoffs principle
Rivest Cipher
28. Attmpts to conceal data by hiding it; Used by placing information in objectssuch as graphics; sound files or document headers
ONE time pad problems
work factor
CBC MAC
steganography
29. RC(x) - 32 - 64 - 128 bit blocks - key max at 2048 bits
initialization vector/salt
3DES
Rivest Cipher
Diffie-Hellman Algorithm
30. Looks for patterns in ciphertext to discover the key.
Hybrid Encryption
CRL
frequency analysis
REED D asym algorithms
31. DES - 3des - aes - idea - two fish - rc4 - blow fish
Diffe Helman
birthday paradox
Symmetric Algorithms
cryptovariable
32. Malled online encryption or traffic flow security- implemented in hardware' encrypts all traffic in a single path
link encryption
diffusion
one time pad
key mgmt tasks
33. First public key algorithm; not used for message encrypt or digital signatures; uses large prime numbers; requires both sender and reciever to have key pairs; vulnerable to man in the middle attacks
key escrow
Diffe Helman
kerckhoffs principle
steganography
34. Hardware - software - and policies (security association) -
hybrid encrypt features
IDEA
Public Key Infrastructure
zero knowledge proof
35. Cipher Feedback Emulates stream cipher data encrypted in smaller units than block size; plaintext pattersn concealed in XOR; previous ciphertext block is encrypted and output produced is conbined with plaintext block using XOR-to produce next ciphert
DES CFB
diffusion
AES
LUC
36. Numeric seeding value used to with a symmetric key to provide randomness
initialization vector/salt
cryptology
key storage
steganography
37. Study of both cryptography and cryptanalysis
cryptology
hashing algorithm
recovery agent
diffusion
38. Hides data in images - usually by LSB (least significant bit)
Public Key Infrastructure
cryptography
asymmetric algorithms
steganography
39. Encrypted data-black side
cryptology
CAST
DES CBC
ciphertext
40. Secret; single; conventional; session; shared; private
symetric synonyms
modular mathematics
key mgmt tasks
substitution cipher
41. Both parties have same key(kept secret) exchage keys before comms begins; faster than asymmetric crypto; best suited for bulk encryption; N(N-1)/2 is the number of keys needed; File Encryption Key (FEK)
trust model types
end to end enccryption
symmetric Crypto
non-repudiation
42. 1996 - crypto is protected in agreement.
IDEA
concealment cipher
wassenaar arrangement
caesar cipher
43. Binary operation that adds bits together; plaintext is XORed with a random keystream to generate cyphertext
DES CBC
Exclusive Or(XOR)
Digital Signature Standard
key mgmgt defined
44. Rearranges bits or bytes
modular mathematics
transposition cipher
running key
caesar cipher
45. Block based - Previous block seeds next blocks key
ciphertext
Cipher Block Chaining
DES CBC
RSA
46. Keyword: integrity
Exclusive Or(XOR)
CAST
key mgmgt defined
Hash
47. Modified md5 - v means "variable"
asymmetric algorithms
substitution cipher
HAVAL
key clustering
48. Setting policies; protecting keys; key recovery; responding to key compromise; keys long enough to prevent attack; cryptoperiod: key lifetimes
key mgmgt defined
running key
steganography
SHA1
49. Digital signature standard; performs integrity by SHA; uses DSA; RSA;Elyp CurveDSA
FIPS 186
steganography
Trap Door Function
3DES
50. CIA plus non repudiation
Signature
zero knowledge proof
ICV
crypto services