SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Crypto Domain
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Each pair of entities must receive in secure fashion; requires more overhead than worth; key distro challenging- sender recievermust be on the same sheet
ONE time pad problems
cryptology
initialization vector/salt
HMAC
2. Science of breakin the code
cryptanalysis
OCSP
frequency analysis
link encryption
3. No plaintext exposure; encrypted at source; VPN; SSL ;SSH
MD5
concealment cipher
end to end enccryption
monoalphabetic
4. Both parties have same key(kept secret) exchage keys before comms begins; faster than asymmetric crypto; best suited for bulk encryption; N(N-1)/2 is the number of keys needed; File Encryption Key (FEK)
symmetric Crypto
link encryption
key mgmt tasks
3DES
5. NIST 1991 - outlines authorized algorithms
Rivest Cipher
algorithm
Digital Signature Standard
key mgmt tasks
6. Rearranges bits or bytes
asymmetric algorithms
transposition cipher
end to end enccryption
DES OFB
7. Set of mathmatical rules used in encryption
CRL
HAVAL
algorithm
collision
8. variable block and key sizes 128; 192; 256; uses a variable number of rounds; has low memory requirements; easy to defend against timing attacks; implemented in software; hardware is costly.
hashing algorithm strengths
AES
IDEA
Blowfish
9. Science of protecting information by encoding it
cryptography
substitution cipher
transposition cipher
rounds
10. Published document describing: howa CA is structured;which standards are used and how certs are managed
certificate practice statement
Digital Signature Standard
Diffie-Hellman Algorithm
HMAC
11. Message Authentication codes; aka message integrity code; modification detection code; cryptographic checksum; generated by running message through secret key(DES CBC) MAC is the last block generated by algorithm 64 bit
concealment cipher
substitution cipher
HAVAL
CBC MAC
12. Encryption - decryption - signing - verifying
SHA2
hybrid encrypt features
Asymmetric uses
IDEA
13. RSA
prime factorization
polyalphabetic
DES
3DES
14. Looks for patterns in ciphertext to discover the key.
crypto services
substitution cipher
frequency analysis
trust model types
15. Advanced Encryption Standard
Diffie-Hellman Algorithm
RiJndael(AES)
Lucifer
Digital Signature Standard
16. Measar cipher
Cipher Block Chaining
monoalphabetic
CA
digital signatures
17. 1996 - crypto is protected in agreement.
cryptanalysis
wassenaar arrangement
work factor
non-repudiation
18. One key - only confidentiality
CAST
key mgmt mechanisms
link encryption
symetric
19. Link Encryption and end to end encryption
3DES
data transmission
Hash Function Uses
Exclusive Or(XOR)
20. Similar to RSA - very efficient for low end hardware/limited processing power.
Elliptical Curve Cryptosystem
AES
Key zeroization
recovery agent
21. Attmpts to conceal data by hiding it; Used by placing information in objectssuch as graphics; sound files or document headers
substitution cipher
scytale
symetric
steganography
22. key storage;escrow;archival;recovery agend;multiple key pairs
prime factorization
key mgmt tasks
ICV
plaintext
23. Certificate Authority; registration authority offloads work; validates identity; distributes key; certificate server maintains repository that stores certificates
3DES
Common Hash Algorithms
transposition/permutation cipher
CA
24. Relies on finding weaknesses in the hashing algorithm
Trap Door Function
AES
brute force attack on hashing
signature
25. Based on diffie-hellman - encryption - digital signatures and key exchange.
Symmetric Algorithms
substitution cipher
El Gamal
Asymmetric uses
26. Authentication and integrity - needed when... At rest and in transit.
steganography
Digital Signature Standard
digital signatures
signature
27. Authenticity - integrity - digital signatures - storing passwords.
concealment cipher
historical highlights
Hash Function Uses
El Gamal
28. Confidentiality - Authentication - Non-Repudiation
Asymmetric Enc provides
CBC MAC
digital signatures
plaintext
29. Upgrade to DES; Replaced by AES; takes three times longer to encrypt
key storage
zero knowledge proof
3DES
LUC
30. Setting policies; protecting keys; key recovery; responding to key compromise; keys long enough to prevent attack; cryptoperiod: key lifetimes
RiJndael(AES)
key mgmgt defined
transposition cipher
diffusion
31. Digital signature standard; performs integrity by SHA; uses DSA; RSA;Elyp CurveDSA
wassenaar arrangement
non-repudiation
FIPS 186
frequency analysis
32. Hash Mess Auth Code (512bit MD5; SHA-1); calculated using a hash function with secret key- shared key appended to data shared faster than DES CBC- used in IPSEC SSL/TLS and SSH
HAVAL
Exclusive Or(XOR)
HMAC
key archival
33. Data Encryption Standard - 64 bit blocks - 56 bit key - 16 rounds - 4 modes
Key zeroization
key mgmt tasks
DES
cryptology
34. Easily transportable;cannot be initiated by something else; can be automatically time stamped;provides integrity by encrypting hash value;hash value generated with senders private key
Hash
algorithm
digital signatures
REED D asym algorithms
35. Uses Lucas functions.
Common Hash Algorithms
symmetric algorithms types
LUC
steganography
36. DES - 3des - aes - idea - two fish - rc4 - blow fish
steganography
hashing algorithm
Symmetric Algorithms
Knapsack
37. NIST and NSA - 160 bit digest
historical highlights
caesar cipher
transposition cipher
SHA1
38. Rives Shamir; adleman- based on factoring of large prime numbers-encrypt-dig sig- and key exchange variable key length 512 to 4096- strong but slow; 100 times slower than software; 1000-10000 slower than hardware encryption
message hashing
steganography
RSA
Asymmetric uses
39. Numeric seeding value used to with a symmetric key to provide randomness
key mgmgt defined
initialization vector/salt
Common Hash Algorithms
Rivest Cipher
40. Encrypted data-black side
ciphertext
Signature
end to end enccryption
work factor
41. Keys needed to decrypt cyphertext so an authorized third party can gain access
key mgmt mechanisms
DES CTR
key escrow
steganography
42. Based on Dif Hel; provides encrypt; dig sig; and key exchange; discrete logarithms-easy to reverse engineer; main drawback is performance- slower than other algorithms
el gamal
Rivest Cipher
initialization vector/salt
AES
43. Monsidered unbreakable- each pad made up of truly random values; used once; securely distributed- protected at sender and reciever sites
one time pad
confusion
cryptology
end to end enccryption
44. Replaces bits characters and block s with differecnt values
3DES
DES OFB
substitution cipher
IDEA
45. 32 to 448 bit key - Schneier
Blowfish
Diffe Helman
confusion
SHA2
46. Advanced Encryption Standard - replaced DES - Rijndael based - 128 - 192 - and 256 bit keys/blocks with 10 - 12 - 14 rounds resp.
key space
Elliptical Curve Cryptosystem
diffusion
AES
47. Secret; single; conventional; session; shared; private
collision
steganography
symetric synonyms
brute force attack on hashing
48. Hides data in images - usually by LSB (least significant bit)
Rivest Cipher
asymmetric key encryption
steganography
certificate practice statement
49. 48 rounds - 2 or 3 keys - enc enc enc (EEE) - or enc dec enc (EDE)
4 O's
El Gamal
3DES
Electronic Code Book
50. Estimated time resources to break a cryptosystem
Asymmetric Enc provides
symetric
RiJndael(AES)
work factor