SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Crypto Domain
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. OCSP; OSPF- routing protocol; Online Vulnerability Assessment Language; Orthogonal Frequency Division Multiplexing
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
2. Block based - adds padding - same key - same clear = same ciphertext
OCSP
Electronic Code Book
Hash Function Uses
CAST
3. Buries a message by taking the least significant bit of evvery byte to carry the message; hide a message in another message. Graphics; sound files; alternated used in corporate espionage
Exclusive Or(XOR)
key archival
OCSP
steganography
4. Stream cipher; stream algorithm works one bit at a time usually done in Hardware; no memory required; very fast; block cipher; works on blocks of bits; transforms into fixed length blocks; encrypted block by block 64; 128; 256 uses substitution and t
symmetric algorithms types
algorithm
certificate practice statement
FIPS 186
5. Data Encryption Standard - 64 bit blocks - 56 bit key - 16 rounds - 4 modes
initialization vector/salt
trust model types
steganography
DES
6. Broken
Knapsack
IDEA
Diffe Helman
Elliptical Curve Cryptosystem
7. First public key algorithm; not used for message encrypt or digital signatures; uses large prime numbers; requires both sender and reciever to have key pairs; vulnerable to man in the middle attacks
ICV
historical highlights
hybrid encrypt features
Diffe Helman
8. A specific proceedure
non-repudiation
SHA2
algorithm
El Gamal
9. Advanced Encryption Standard - replaced DES - Rijndael based - 128 - 192 - and 256 bit keys/blocks with 10 - 12 - 14 rounds resp.
ICV
AES
DES CTR
Diffe Helman
10. Asymmetric enc + Hash - validity of message - non repudiation
Diffie-Hellman Algorithm
Signature
el gamal
key mgmt mechanisms
11. Used with keys; do not need to be encypted; required to prevent defeat of keyspace through pattern analysis
symmetric Crypto
signature
prime factorization
initialization vector/salt
12. Authentication and integrity - needed when... At rest and in transit.
signature
Hash Function Uses
symetric synonyms
Output Feedback Mode
13. 1996 - crypto is protected in agreement.
ciphertext
wassenaar arrangement
substitution cipher
PKI
14. Rivest-Shamir-Adleman - factorization - used for encryption - key exchange and digital signature.
steganography
collision
initialization vector/salt
RSA
15. Placementof a secret copy in a secure location
ONE time pad problems
key storage
REED D asym algorithms
MD5
16. RSA; El Gamal; ECC; Diffe Hellman; DSA
REED D asym algorithms
steganography
Knapsack
Hash Function Uses
17. Formula is public; used to creat checksums; message digests; or integrity check values
Hash Function Uses
hashing algorithm strengths
cryptanalysis
Stream Cipher
18. Numeric seeding value used to with a symmetric key to provide randomness
substitution cipher
initialization vector/salt
Rivest Cipher
Signature
19. International Data Enc Algorithm - 64 bit block - 128 bit key
transposition cipher
IDEA
3DES
rounds
20. Certificate Authority; registration authority offloads work; validates identity; distributes key; certificate server maintains repository that stores certificates
Diffe Helman
Hybrid Encryption
AES
CA
21. Message hidden within larger context.
concealment cipher
key mgmgt defined
IDEA
recovery agent
22. Rearranges bits or bytes
transposition cipher
Hybrid Encryption
RSA
symetric
23. Online Certificate Status Protocol- used to query the CA; useful in large; complex environments; responds to a query with status of valid; suspended; or revoked
cert contents
OCSP
Asymmetric uses
substitution cipher
24. Replaces bits characters and block s with differecnt values
HMAC
substitution cipher
symmetric Crypto
historical highlights
25. Rearrances the bits characters or character blocks
transposition/permutation cipher
prime factorization
symmetric algorithms types
CAST
26. Science of protecting information by encoding it
cryptography
AES
key space
MD5
27. Set symbol size usually 64 bits
rounds
wassenaar arrangement
running key
Block Cipher
28. Uses asymmetric to figure out a key - symmetric used for large data encryption.
algorithm
birthday paradox
key space
Hybrid Encryption
29. Eliptical Curve Cryptography; encryption; dig signatures and key exchange;highest strength per bit of key length; most efficient;160 bit el gamal= 1024 RSA-used in wireless devices use
ECC
Digital Signature Standard
Symmetric Algorithms
3DES
30. Keys needed to decrypt cyphertext so an authorized third party can gain access
Knapsack
Public Key Infrastructure
transposition/permutation cipher
key escrow
31. Integrity
Hash
REED D asym algorithms
ECC
message hashing
32. Estimated time resources to break a cryptosystem
work factor
wassenaar arrangement
link encryption
ICV
33. Different keys for encryption and decryption; two keys private and public Encrypt with private- unencrypt with privateor encrypt with public- decrypt with private. Use of private ensures non repudiation; without confidentiality-becomes the digital si
Block Cipher
HMAC
asymmetric algorithms
Cipher Feedback Mode
34. Message Authentication Code - Symmetric enc + Hash
HAVAL
SHA1
HMAC
ICV
35. Set of mathmatical rules used in encryption
Diffie-Hellman Algorithm
key storage
algorithm
LUC
36. Authenticity - integrity - digital signatures - storing passwords.
Hash Function Uses
recovery agent
Cipher Block Chaining
Exclusive Or(XOR)
37. Cert Revocation List- identifies Certs that are no longer recognized; maintained and updated periodically; Browsers use OCSP for updates.
CRL
frequency analysis
digital signatures
rounds
38. Similar to RSA - very efficient for low end hardware/limited processing power.
Digital Signature Standard
Elliptical Curve Cryptosystem
recovery agent
Digital Signature Standard Algorithms
39. Encrypted data-black side
Symmetric Algorithms
steganography
ciphertext
collision
40. Hash Mess Auth Code (512bit MD5; SHA-1); calculated using a hash function with secret key- shared key appended to data shared faster than DES CBC- used in IPSEC SSL/TLS and SSH
historical highlights
SHA2
Common Hash Algorithms
HMAC
41. International Data Encryption Algorithm- operateson 64 bit blocks-uses 128 bit key and is faster than DES; used in PGP and other software; no successful attacks
IDEA
Block Cipher
Knapsack
end to end enccryption
42. Setting policies; protecting keys; key recovery; responding to key compromise; keys long enough to prevent attack; cryptoperiod: key lifetimes
work factor
running key
key mgmgt defined
frequency analysis
43. Cannot deny ownership / origination.
asymmetric algorithms
HAVAL
non-repudiation
initialization vector/salt
44. Upgrade to DES; Replaced by AES; takes three times longer to encrypt
hashing algorithm
3DES
non-repudiation
caesar cipher
45. Large set of possible values used to construct keys
initialization vector/salt
key space
el gamal
4 O's
46. NIST and NSA - 160 bit digest
PKI
LUC
steganography
SHA1
47. Monsidered unbreakable- each pad made up of truly random values; used once; securely distributed- protected at sender and reciever sites
one time pad
ONE time pad problems
Cipher Feedback Mode
running key
48. Centralized key mgt key issuer; keeps copy of keys or decentralized key mgt; end user generates keys and submits to CA;does not provide for key escrow; no recovery possible
key mgmt mechanisms
DES OFB
brute force attack on hashing
Knapsack
49. Function that takes a variable length string; and compresses and transforms it into a fixed length- output called a hash or message digest
trust model types
hashing algorithm
substitution cipher
RSA
50. Confidentiality - Authentication - Non-Repudiation
end to end enccryption
Asymmetric Enc provides
wassenaar arrangement
SHA2