SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Crypto Domain
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Cannot deny ownership / origination.
DES CFB
non-repudiation
3DES
4 O's
2. Instance when two keys keys generate the same ciphertext from same plaintext
key clustering
cryptology
El Gamal
plaintext
3. Public algorithm - private key.
blowfish
kerckhoffs principle
Digital Signature Standard Algorithms
scytale
4. Used with keys; do not need to be encypted; required to prevent defeat of keyspace through pattern analysis
Knapsack
frequency analysis
initialization vector/salt
key archival
5. Simple substitution - ROT-n - mono-alphabetical.
caesar cipher
REED D asym algorithms
DES CTR
HMAC
6. Cipher Feedback Emulates stream cipher data encrypted in smaller units than block size; plaintext pattersn concealed in XOR; previous ciphertext block is encrypted and output produced is conbined with plaintext block using XOR-to produce next ciphert
DES CFB
crypto services
Cipher Feedback Mode
cryptology
7. 128 bit digest
MD5
DES ECB
recovery agent
polyalphabetic
8. 32 to 448 bit key - Schneier
Blowfish
prime factorization
polyalphabetic
Trap Door Function
9. Binary operation that adds bits together; plaintext is XORed with a random keystream to generate cyphertext
DES CBC
Exclusive Or(XOR)
HMAC
REED D asym algorithms
10. Modified md5 - v means "variable"
zero knowledge proof
Hybrid Encryption
key escrow
HAVAL
11. Message Authentication Code - Symmetric enc + Hash
caesar cipher
steganography
HMAC
RSA
12. Setting policies; protecting keys; key recovery; responding to key compromise; keys long enough to prevent attack; cryptoperiod: key lifetimes
Key zeroization
REED D asym algorithms
key mgmgt defined
OCSP
13. key storage;escrow;archival;recovery agend;multiple key pairs
CAST
key mgmt tasks
CBC MAC
transposition cipher
14. Mipher added to plaintext to encrypt
one time pad
historical highlights
recovery agent
running key
15. CIA plus non repudiation
FIPS 186
RSA
Output Feedback Mode
crypto services
16. Relies on finding weaknesses in the hashing algorithm
el gamal
brute force attack on hashing
hashing algorithm strengths
scytale
17. DES - 3des - aes - idea - two fish - rc4 - blow fish
Signature
collision
Symmetric Algorithms
Cipher Feedback Mode
18. Confidentiality - Authentication - Non-Repudiation
asymmetric key encryption
Block Cipher
el gamal
Asymmetric Enc provides
19. One-way - difficult to solve - uses factorization - private key can compute the public key
el gamal
ONE time pad problems
SHA1
Trap Door Function
20. Block based - adds padding - same key - same clear = same ciphertext
DES CTR
brute force attack on hashing
Knapsack
Electronic Code Book
21. variable block and key sizes 128; 192; 256; uses a variable number of rounds; has low memory requirements; easy to defend against timing attacks; implemented in software; hardware is costly.
Digital Signature Standard Algorithms
AES
recovery agent
hybrid encrypt features
22. Letters represented by numerical place in the alphabet
key mgmgt defined
DES ECB
REED D asym algorithms
modular mathematics
23. Encryption - decryption - signing - verifying
certificate practice statement
3DES
Asymmetric uses
wassenaar arrangement
24. Set of mathmatical rules used in encryption
algorithm
Signature
ciphertext
symmetric algorithms types
25. Rives Shamir; adleman- based on factoring of large prime numbers-encrypt-dig sig- and key exchange variable key length 512 to 4096- strong but slow; 100 times slower than software; 1000-10000 slower than hardware encryption
RSA
hybrid encrypt features
key space
non-repudiation
26. Numeric seeding value used to with a symmetric key to provide randomness
work factor
key archival
historical highlights
initialization vector/salt
27. Block based - Previous block seeds next blocks key
Cipher Block Chaining
ONE time pad problems
work factor
DES CBC
28. Advanced Encryption Standard
caesar cipher
RiJndael(AES)
Cipher Block Chaining
data transmission
29. First public key algorithm; not used for message encrypt or digital signatures; uses large prime numbers; requires both sender and reciever to have key pairs; vulnerable to man in the middle attacks
substitution cipher
symmetric Crypto
Cipher Feedback Mode
Diffe Helman
30. Both parties have same key(kept secret) exchage keys before comms begins; faster than asymmetric crypto; best suited for bulk encryption; N(N-1)/2 is the number of keys needed; File Encryption Key (FEK)
recovery agent
end to end enccryption
wassenaar arrangement
symmetric Crypto
31. Integrity
key space
DES CTR
Common Hash Algorithms
message hashing
32. Certificate Authority; registration authority offloads work; validates identity; distributes key; certificate server maintains repository that stores certificates
CA
Hash Function Uses
HMAC
Elliptical Curve Cryptosystem
33. Similar to RSA - very efficient for low end hardware/limited processing power.
Elliptical Curve Cryptosystem
transposition/permutation cipher
SHA1
Public Key Infrastructure
34. RSA; El Gamal; ECC; Diffe Hellman; DSA
Hash Function Uses
REED D asym algorithms
frequency analysis
initialization vector/salt
35. A specific proceedure
prime factorization
REED D asym algorithms
Lucifer
algorithm
36. Process of properly destroying keys at end of userful loife
PKI
DES
Key zeroization
signature
37. Function that takes a variable length string; and compresses and transforms it into a fixed length- output called a hash or message digest
blowfish
symetric synonyms
hashing algorithm
Digital Signature Standard Algorithms
38. One time pad - random key - one use - unbreakable
DES ECB
concealment cipher
rounds
vernam cipher
39. Data Encryption Standard (DES) 5 Block Modes; Trple DES runs through it three times; Blowfish; IDEA; RC4; RC5
key mgmgt defined
symmetric algorithms types
one time pad
link encryption
40. Secret; single; conventional; session; shared; private
key clustering
recovery agent
Common Hash Algorithms
symetric synonyms
41. Advanced Encryption Standard - replaced DES - Rijndael based - 128 - 192 - and 256 bit keys/blocks with 10 - 12 - 14 rounds resp.
trust model types
AES
blowfish
Diffe Helman
42. 256 or 512-bit digest
symetric
SHA2
Asymmetric uses
RSA
43. Message hidden within larger context.
concealment cipher
HAVAL
ciphertext
Output Feedback Mode
44. Large set of possible values used to construct keys
substitution cipher
FIPS 186
key clustering
key space
45. Prevent disclosure - privacy
cryptography
HMAC
DES
cryptanalysis
46. Cipher Block Chaining- most common mode of DES loaded sequenctially- XORed using 64 bit initialization vector- first ciphertext XORed with next text block- since IV different;ciphertext different
Digital Signature Standard
cryptanalysis
DES CBC
modular mathematics
47. Centralized key mgt key issuer; keeps copy of keys or decentralized key mgt; end user generates keys and submits to CA;does not provide for key escrow; no recovery possible
key mgmt mechanisms
hybrid encrypt features
symmetric algorithms types
DES
48. First public key exchange system - users exchange keys over insecure medium.
DES CTR
IDEA
Diffie-Hellman Algorithm
trust model types
49. Science of breakin the code
Trap Door Function
ICV
Common Hash Algorithms
cryptanalysis
50. NIST and NSA - 160 bit digest
SHA1
IDEA
Block Cipher
substitution cipher