SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
CISSP Crypto Domain
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Set symbol size usually 64 bits
Block Cipher
hashing algorithm strengths
data transmission
Asymmetric uses
2. Monsidered unbreakable- each pad made up of truly random values; used once; securely distributed- protected at sender and reciever sites
HAVAL
concealment cipher
one time pad
Signature
3. Data in readable format- red side
El Gamal
DES OFB
plaintext
polyalphabetic
4. Certificate Authority; registration authority offloads work; validates identity; distributes key; certificate server maintains repository that stores certificates
wassenaar arrangement
Hash Function Uses
CA
end to end enccryption
5. Electronic Code Book Each block encrypted independently; 64 bits at a time; using same key; given message; always same ciphertext; susceptible to plaintext attack
CAST
DES OFB
DES ECB
MD5
6. Storage of keys and certs for extended period of time-normally performed by CA a trusted third party; or key holder
key clustering
key archival
Common Hash Algorithms
Diffie-Hellman Algorithm
7. RC(x) - 32 - 64 - 128 bit blocks - key max at 2048 bits
Asymmetric Enc provides
key clustering
symmetric Crypto
Rivest Cipher
8. Function that takes a variable length string; and compresses and transforms it into a fixed length- output called a hash or message digest
key space
hashing algorithm
rounds
IDEA
9. Rivest-Shamir-Adleman - factorization - used for encryption - key exchange and digital signature.
Signature
RSA
signature
Hash Function Uses
10. Based on diffie-hellman - encryption - digital signatures and key exchange.
El Gamal
blowfish
Key zeroization
one time pad
11. Replaces bits characters and block s with differecnt values
CA
modular mathematics
symmetric algorithms types
substitution cipher
12. Uses asymmetric to figure out a key - symmetric used for large data encryption.
steganography
RSA
Hybrid Encryption
REED D asym algorithms
13. Hardware - software - and policies (security association) -
digital signatures
Public Key Infrastructure
key mgmgt defined
HMAC
14. Rearrances the bits characters or character blocks
certificate practice statement
transposition/permutation cipher
confusion
CAST
15. Placementof a secret copy in a secure location
Hash Function Uses
key storage
key mgmt mechanisms
CBC MAC
16. Estimated time resources to break a cryptosystem
work factor
vernam cipher
key mgmt tasks
vigenere cipher
17. Science of protecting information by encoding it
Output Feedback Mode
LUC
cryptography
Diffie-Hellman Algorithm
18. Based on probability with 23 people 50% chance 2 will have same birthday
diffusion
birthday paradox
initialization vector/salt
confusion
19. Centralized key mgt key issuer; keeps copy of keys or decentralized key mgt; end user generates keys and submits to CA;does not provide for key escrow; no recovery possible
prime factorization
key mgmt mechanisms
blowfish
cert contents
20. Eliptical Curve Cryptography; encryption; dig signatures and key exchange;highest strength per bit of key length; most efficient;160 bit el gamal= 1024 RSA-used in wireless devices use
el gamal
RSA
ECC
symetric
21. A specific proceedure
4 O's
algorithm
LUC
Lucifer
22. Hash Mess Auth Code (512bit MD5; SHA-1); calculated using a hash function with secret key- shared key appended to data shared faster than DES CBC- used in IPSEC SSL/TLS and SSH
Signature
RSA
HMAC
hybrid encrypt features
23. Public algorithm - private key.
birthday paradox
steganography
crypto services
kerckhoffs principle
24. Provided by mixing key values during repeated rounds of encryption
LUC
running key
confusion
DES ECB
25. Scrambled version of the alphabet
polyalphabetic
DES CBC
PKI
concealment cipher
26. Operates on bits - higher speed - usually implemented in hardware.
cryptology
RSA
Stream Cipher
scytale
27. Rives Shamir; adleman- based on factoring of large prime numbers-encrypt-dig sig- and key exchange variable key length 512 to 4096- strong but slow; 100 times slower than software; 1000-10000 slower than hardware encryption
CBC MAC
Lucifer
RSA
message hashing
28. Encrypted data-black side
ciphertext
recovery agent
symmetric Crypto
HAVAL
29. Published document describing: howa CA is structured;which standards are used and how certs are managed
certificate practice statement
cryptanalysis
RSA
transposition cipher
30. Polyalphabetic - substitution - 2d grid of alphabet
SHA2
ECC
vigenere cipher
cryptanalysis
31. Looks for patterns in ciphertext to discover the key.
HMAC
DES CTR
Common Hash Algorithms
frequency analysis
32. Data Encryption Standard (DES) 5 Block Modes; Trple DES runs through it three times; Blowfish; IDEA; RC4; RC5
Common Hash Algorithms
concealment cipher
ciphertext
symmetric algorithms types
33. One time pad - random key - one use - unbreakable
Hash Function Uses
vernam cipher
Hybrid Encryption
monoalphabetic
34. MD5 - SHA1
Diffie-Hellman Algorithm
CA
non-repudiation
Common Hash Algorithms
35. Asymmetric enc + Hash - validity of message - non repudiation
Signature
key storage
DES ECB
hashing algorithm strengths
36. Message Authentication Code - Symmetric enc + Hash
HMAC
substitution cipher
modular mathematics
Signature
37. International Data Enc Algorithm - 64 bit block - 128 bit key
DES OFB
Asymmetric Enc provides
IDEA
LUC
38. Link Encryption and end to end encryption
DES CFB
cryptography
data transmission
birthday paradox
39. One key - only confidentiality
initialization vector/salt
symetric
symetric synonyms
Hybrid Encryption
40. Upgrade to DES; Replaced by AES; takes three times longer to encrypt
Symmetric Algorithms
Exclusive Or(XOR)
historical highlights
3DES
41. SHA - RSA - Eliptical Curve (ECDSA)
Hash Function Uses
ICV
Digital Signature Standard Algorithms
cert contents
42. Rearranges bits or bytes
kerckhoffs principle
brute force attack on hashing
Hash
transposition cipher
43. Public Key Infrastructure- Developed to provide standards for key generation; authentication; x.509 non used with Pretty Good Privacy; good private good "web of trust"
PKI
certificate practice statement
Hybrid Encryption
IDEA
44. Each pair of entities must receive in secure fashion; requires more overhead than worth; key distro challenging- sender recievermust be on the same sheet
ONE time pad problems
Signature
initialization vector/salt
Electronic Code Book
45. When a hash fuunction generates same output for same input
collision
Block Cipher
data transmission
symetric synonyms
46. Block based - Previous block seeds next blocks key
Hybrid Encryption
Cipher Block Chaining
REED D asym algorithms
3DES
47. Used with keys; do not need to be encypted; required to prevent defeat of keyspace through pattern analysis
non-repudiation
initialization vector/salt
el gamal
key escrow
48. RSA
Signature
DES CFB
hybrid encrypt features
prime factorization
49. Set of mathmatical rules used in encryption
IDEA
algorithm
IDEA
CBC MAC
50. Simple substitution - ROT-n - mono-alphabetical.
caesar cipher
data transmission
Elliptical Curve Cryptosystem
work factor