SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
CISSP Crypto Domain
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Storage of keys and certs for extended period of time-normally performed by CA a trusted third party; or key holder
brute force attack on hashing
rounds
key archival
AES
2. One time pad - random key - one use - unbreakable
ciphertext
cryptovariable
rounds
vernam cipher
3. Stream based - errors do not propagate across blocks
el gamal
Output Feedback Mode
Cipher Feedback Mode
birthday paradox
4. variable block and key sizes 128; 192; 256; uses a variable number of rounds; has low memory requirements; easy to defend against timing attacks; implemented in software; hardware is costly.
Hash
SHA2
AES
monoalphabetic
5. Eliptical Curve Cryptography; encryption; dig signatures and key exchange;highest strength per bit of key length; most efficient;160 bit el gamal= 1024 RSA-used in wireless devices use
end to end enccryption
ECC
CA
key escrow
6. Based on diffie-hellman - encryption - digital signatures and key exchange.
DES CBC
Key zeroization
diffusion
El Gamal
7. Secret; single; conventional; session; shared; private
symetric synonyms
CBC MAC
birthday paradox
DES OFB
8. Malled online encryption or traffic flow security- implemented in hardware' encrypts all traffic in a single path
el gamal
DES CFB
one time pad
link encryption
9. Credentials that allow verification; contains serial no; ident info; dig signature;lifetime dates;public key of the cert holder
FIPS 186
kerckhoffs principle
cert contents
Blowfish
10. Mipher added to plaintext to encrypt
message hashing
work factor
key storage
running key
11. Data in readable format- red side
RSA
Electronic Code Book
Stream Cipher
plaintext
12. Used with keys; do not need to be encypted; required to prevent defeat of keyspace through pattern analysis
plaintext
certificate practice statement
initialization vector/salt
Hash Function Uses
13. Upgrade to DES; Replaced by AES; takes three times longer to encrypt
Asymmetric Enc provides
DES CTR
trust model types
3DES
14. No plaintext exposure; encrypted at source; VPN; SSL ;SSH
end to end enccryption
Electronic Code Book
Digital Signature Standard Algorithms
ciphertext
15. Process of properly destroying keys at end of userful loife
symmetric Crypto
one time pad
Key zeroization
monoalphabetic
16. Letters represented by numerical place in the alphabet
modular mathematics
brute force attack on hashing
DES ECB
symetric
17. Each pair of entities must receive in secure fashion; requires more overhead than worth; key distro challenging- sender recievermust be on the same sheet
ONE time pad problems
hashing algorithm
historical highlights
3DES
18. First public key algorithm; not used for message encrypt or digital signatures; uses large prime numbers; requires both sender and reciever to have key pairs; vulnerable to man in the middle attacks
asymmetric algorithms
Diffe Helman
zero knowledge proof
cert contents
19. Keys needed to decrypt cyphertext so an authorized third party can gain access
Elliptical Curve Cryptosystem
Exclusive Or(XOR)
key escrow
SHA1
20. Integrity Check Value-makes the hash with the hash algorithm
vigenere cipher
trust model types
steganography
ICV
21. Rivest-Shamir-Adleman - factorization - used for encryption - key exchange and digital signature.
ECC
modular mathematics
RSA
RiJndael(AES)
22. Estimated time resources to break a cryptosystem
LUC
work factor
Electronic Code Book
caesar cipher
23. Binary operation that adds bits together; plaintext is XORed with a random keystream to generate cyphertext
frequency analysis
Asymmetric Enc provides
Exclusive Or(XOR)
data transmission
24. Spartans - wrapped around rod.
scytale
RSA
CA
Symmetric Algorithms
25. Large set of possible values used to construct keys
certificate practice statement
key space
key escrow
cryptology
26. Uses asymmetric to figure out a key - symmetric used for large data encryption.
Digital Signature Standard
link encryption
CAST
Hybrid Encryption
27. Output feedback; emulates stream cipher; similar to CFB except qty XORed; with each plaintext block; IV used as a seed; then keystream used as IV in continuing process
DES OFB
ONE time pad problems
modular mathematics
AES
28. 64 bit blocks of data; variable key lengths
Asymmetric uses
prime factorization
ICV
blowfish
29. Modified md5 - v means "variable"
plaintext
monoalphabetic
HAVAL
3DES
30. Buries a message by taking the least significant bit of evvery byte to carry the message; hide a message in another message. Graphics; sound files; alternated used in corporate espionage
Cipher Feedback Mode
Trap Door Function
steganography
IDEA
31. Data Encryption Standard - 64 bit blocks - 56 bit key - 16 rounds - 4 modes
symmetric algorithms types
DES
cryptovariable
DES ECB
32. Keyword: integrity
Hash
Symmetric Algorithms
CBC MAC
HMAC
33. RC(x) - 32 - 64 - 128 bit blocks - key max at 2048 bits
Rivest Cipher
Public Key Infrastructure
key archival
transposition cipher
34. Centralized key mgt key issuer; keeps copy of keys or decentralized key mgt; end user generates keys and submits to CA;does not provide for key escrow; no recovery possible
ONE time pad problems
Knapsack
key mgmt mechanisms
kerckhoffs principle
35. Instance when two keys keys generate the same ciphertext from same plaintext
signature
Output Feedback Mode
key archival
key clustering
36. Placementof a secret copy in a secure location
Hash
key storage
polyalphabetic
IDEA
37. 1996 - crypto is protected in agreement.
wassenaar arrangement
CBC MAC
ECC
DES OFB
38. Hash Mess Auth Code (512bit MD5; SHA-1); calculated using a hash function with secret key- shared key appended to data shared faster than DES CBC- used in IPSEC SSL/TLS and SSH
Symmetric Algorithms
hashing algorithm strengths
HMAC
DES CBC
39. RSA; El Gamal; ECC; Diffe Hellman; DSA
REED D asym algorithms
scytale
signature
3DES
40. Data Encryption Standard (DES) 5 Block Modes; Trple DES runs through it three times; Blowfish; IDEA; RC4; RC5
symmetric algorithms types
hashing algorithm
asymmetric algorithms
SHA2
41. Relies on finding weaknesses in the hashing algorithm
4 O's
brute force attack on hashing
3DES
DES CTR
42. Block based - adds padding - same key - same clear = same ciphertext
Electronic Code Book
Asymmetric Enc provides
birthday paradox
Exclusive Or(XOR)
43. Set of mathmatical rules used in encryption
algorithm
DES CFB
wassenaar arrangement
el gamal
44. Electronic Code Book Each block encrypted independently; 64 bits at a time; using same key; given message; always same ciphertext; susceptible to plaintext attack
symetric synonyms
Diffie-Hellman Algorithm
DES ECB
CRL
45. Secret sequence of bits and instructions used to encrypt/decrypt
diffusion
HAVAL
RSA
cryptovariable
46. Broken
digital signatures
crypto services
Knapsack
CRL
47. Prove knowledge of a fact to a third party without revealing the fact itself
cryptovariable
scytale
zero knowledge proof
crypto services
48. Similar to RSA - very efficient for low end hardware/limited processing power.
Elliptical Curve Cryptosystem
prime factorization
collision
substitution cipher
49. OCSP; OSPF- routing protocol; Online Vulnerability Assessment Language; Orthogonal Frequency Division Multiplexing
50. Replaces bits characters and block s with differecnt values
substitution cipher
asymmetric key encryption
LUC
CA