SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Crypto Domain
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. First public key exchange system - users exchange keys over insecure medium.
algorithm
Stream Cipher
Diffie-Hellman Algorithm
Trap Door Function
2. Data in readable format- red side
Symmetric Algorithms
PKI
Elliptical Curve Cryptosystem
plaintext
3. Process of properly destroying keys at end of userful loife
el gamal
Exclusive Or(XOR)
Key zeroization
SHA2
4. Stream based - also uses prior cypher text to seed
Cipher Feedback Mode
Key zeroization
algorithm
cryptology
5. Centralized key mgt key issuer; keeps copy of keys or decentralized key mgt; end user generates keys and submits to CA;does not provide for key escrow; no recovery possible
key mgmgt defined
key mgmt mechanisms
HAVAL
rounds
6. Storage of keys and certs for extended period of time-normally performed by CA a trusted third party; or key holder
key archival
prime factorization
asymmetric algorithms
kerckhoffs principle
7. Replaces bits characters and block s with differecnt values
key archival
ICV
Exclusive Or(XOR)
substitution cipher
8. Rearranges bits or bytes
cert contents
transposition cipher
key space
caesar cipher
9. Science of protecting information by encoding it
cryptography
monoalphabetic
concealment cipher
brute force attack on hashing
10. Set symbol size usually 64 bits
key mgmt tasks
data transmission
plaintext
Block Cipher
11. One-way - difficult to solve - uses factorization - private key can compute the public key
El Gamal
hashing algorithm
Rivest Cipher
Trap Door Function
12. variable block and key sizes 128; 192; 256; uses a variable number of rounds; has low memory requirements; easy to defend against timing attacks; implemented in software; hardware is costly.
plaintext
initialization vector/salt
AES
substitution cipher
13. Easily transportable;cannot be initiated by something else; can be automatically time stamped;provides integrity by encrypting hash value;hash value generated with senders private key
digital signatures
RiJndael(AES)
algorithm
crypto services
14. Credentials that allow verification; contains serial no; ident info; dig signature;lifetime dates;public key of the cert holder
key space
cert contents
transposition/permutation cipher
Diffe Helman
15. Buries a message by taking the least significant bit of evvery byte to carry the message; hide a message in another message. Graphics; sound files; alternated used in corporate espionage
HAVAL
steganography
initialization vector/salt
CA
16. Prove knowledge of a fact to a third party without revealing the fact itself
key mgmt mechanisms
cryptography
zero knowledge proof
el gamal
17. Cannot deny ownership / origination.
Signature
asymmetric algorithms
non-repudiation
key space
18. Large set of possible values used to construct keys
hashing algorithm
key space
RSA
CBC MAC
19. When a hash fuunction generates same output for same input
link encryption
3DES
collision
DES CTR
20. Spartans - wrapped around rod.
symetric
scytale
DES CFB
Hybrid Encryption
21. Symmetric for Bulk Encrypt; assym for key encapsulation- used in SSL; Email; key exchange
Digital Signature Standard
certificate practice statement
hybrid encrypt features
non-repudiation
22. Message hidden within larger context.
running key
rounds
MD5
concealment cipher
23. 48 rounds - 2 or 3 keys - enc enc enc (EEE) - or enc dec enc (EDE)
FIPS 186
ICV
algorithm
3DES
24. Simple substitution - ROT-n - mono-alphabetical.
key clustering
DES CBC
caesar cipher
substitution cipher
25. Based on probability with 23 people 50% chance 2 will have same birthday
caesar cipher
algorithm
birthday paradox
end to end enccryption
26. Has authority to remove keys from escrow;
crypto services
confusion
Blowfish
recovery agent
27. Malled online encryption or traffic flow security- implemented in hardware' encrypts all traffic in a single path
cryptography
substitution cipher
link encryption
DES CBC
28. Scrambled version of the alphabet
Hash Function Uses
ECC
symetric synonyms
polyalphabetic
29. characters are substituted or shifted
ciphertext
asymmetric algorithms
running key
substitution cipher
30. 32 to 448 bit key - Schneier
Blowfish
REED D asym algorithms
symmetric Crypto
Rivest Cipher
31. International Data Encryption Algorithm- operateson 64 bit blocks-uses 128 bit key and is faster than DES; used in PGP and other software; no successful attacks
key clustering
Rivest Cipher
IDEA
hybrid encrypt features
32. Broken
Elliptical Curve Cryptosystem
RiJndael(AES)
Knapsack
Rivest Cipher
33. Instance when two keys keys generate the same ciphertext from same plaintext
CA
blowfish
key clustering
key archival
34. Measar cipher
monoalphabetic
RiJndael(AES)
end to end enccryption
Block Cipher
35. International Data Enc Algorithm - 64 bit block - 128 bit key
steganography
IDEA
key space
cryptography
36. Hash Mess Auth Code (512bit MD5; SHA-1); calculated using a hash function with secret key- shared key appended to data shared faster than DES CBC- used in IPSEC SSL/TLS and SSH
IDEA
HMAC
asymmetric algorithms
ECC
37. 256 or 512-bit digest
OCSP
DES CTR
asymmetric key encryption
SHA2
38. SHA - RSA - Eliptical Curve (ECDSA)
Digital Signature Standard Algorithms
Asymmetric uses
hashing algorithm strengths
hybrid encrypt features
39. Secret; single; conventional; session; shared; private
data transmission
symetric synonyms
DES CTR
symmetric Crypto
40. Online Certificate Status Protocol- used to query the CA; useful in large; complex environments; responds to a query with status of valid; suspended; or revoked
polyalphabetic
3DES
cryptography
OCSP
41. No plaintext exposure; encrypted at source; VPN; SSL ;SSH
IDEA
kerckhoffs principle
Public Key Infrastructure
end to end enccryption
42. Digital signature standard; performs integrity by SHA; uses DSA; RSA;Elyp CurveDSA
key space
kerckhoffs principle
FIPS 186
substitution cipher
43. Keyword: integrity
substitution cipher
steganography
Hash
El Gamal
44. Data Encryption Standard (DES) 5 Block Modes; Trple DES runs through it three times; Blowfish; IDEA; RC4; RC5
DES
symmetric algorithms types
MD5
el gamal
45. NIST 1991 - outlines authorized algorithms
vernam cipher
Symmetric Algorithms
Digital Signature Standard
symmetric algorithms types
46. Letters represented by numerical place in the alphabet
zero knowledge proof
modular mathematics
algorithm
key storage
47. Provided by mixing up the location of plaintext throughout the cipher
steganography
diffusion
El Gamal
RiJndael(AES)
48. Advanced Encryption Standard
RiJndael(AES)
prime factorization
Hash
Exclusive Or(XOR)
49. Polyalphabetic - substitution - 2d grid of alphabet
modular mathematics
vigenere cipher
transposition/permutation cipher
Cipher Feedback Mode
50. RSA
scytale
prime factorization
Elliptical Curve Cryptosystem
zero knowledge proof