Test your basic knowledge |

CISSP Crypto Domain

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Storage of keys and certs for extended period of time-normally performed by CA a trusted third party; or key holder






2. Broken






3. Provided by mixing key values during repeated rounds of encryption






4. Centralized key mgt key issuer; keeps copy of keys or decentralized key mgt; end user generates keys and submits to CA;does not provide for key escrow; no recovery possible






5. Malled online encryption or traffic flow security- implemented in hardware' encrypts all traffic in a single path






6. Advanced Encryption Standard - replaced DES - Rijndael based - 128 - 192 - and 256 bit keys/blocks with 10 - 12 - 14 rounds resp.






7. Public algorithm - private key.






8. Stream based - also uses prior cypher text to seed






9. First public key algorithm; not used for message encrypt or digital signatures; uses large prime numbers; requires both sender and reciever to have key pairs; vulnerable to man in the middle attacks






10. 128 bit encryption; on 16 rounds of encryption; key size of 64 bits 8 parity; 56 bits long






11. NIST and NSA - 160 bit digest






12. Eliptical Curve Cryptography; encryption; dig signatures and key exchange;highest strength per bit of key length; most efficient;160 bit el gamal= 1024 RSA-used in wireless devices use






13. Digital signature standard; performs integrity by SHA; uses DSA; RSA;Elyp CurveDSA






14. Stream based - errors do not propagate across blocks






15. Advanced Encryption Standard






16. Cipher Feedback Emulates stream cipher data encrypted in smaller units than block size; plaintext pattersn concealed in XOR; previous ciphertext block is encrypted and output produced is conbined with plaintext block using XOR-to produce next ciphert






17. Both parties have same key(kept secret) exchage keys before comms begins; faster than asymmetric crypto; best suited for bulk encryption; N(N-1)/2 is the number of keys needed; File Encryption Key (FEK)






18. Online Certificate Status Protocol- used to query the CA; useful in large; complex environments; responds to a query with status of valid; suspended; or revoked






19. Attmpts to conceal data by hiding it; Used by placing information in objectssuch as graphics; sound files or document headers






20. Pro's: key management cons: speed/file size






21. One key - only confidentiality






22. Different keys for encryption and decryption; two keys private and public Encrypt with private- unencrypt with privateor encrypt with public- decrypt with private. Use of private ensures non repudiation; without confidentiality-becomes the digital si






23. CIA plus non repudiation






24. Used with keys; do not need to be encypted; required to prevent defeat of keyspace through pattern analysis






25. Formula is public; used to creat checksums; message digests; or integrity check values






26. 1996 - crypto is protected in agreement.






27. Uses Lucas functions.






28. Relies on finding weaknesses in the hashing algorithm






29. Instance when two keys keys generate the same ciphertext from same plaintext






30. DES - 3des - aes - idea - two fish - rc4 - blow fish






31. Data Encryption Standard - 64 bit blocks - 56 bit key - 16 rounds - 4 modes






32. 256 or 512-bit digest






33. Rives Shamir; adleman- based on factoring of large prime numbers-encrypt-dig sig- and key exchange variable key length 512 to 4096- strong but slow; 100 times slower than software; 1000-10000 slower than hardware encryption






34. Hash Mess Auth Code (512bit MD5; SHA-1); calculated using a hash function with secret key- shared key appended to data shared faster than DES CBC- used in IPSEC SSL/TLS and SSH






35. Modified md5 - v means "variable"






36. RSA






37. One-way - difficult to solve - uses factorization - private key can compute the public key






38. Keyword: integrity






39. Operates on bits - higher speed - usually implemented in hardware.






40. Cert Revocation List- identifies Certs that are no longer recognized; maintained and updated periodically; Browsers use OCSP for updates.






41. Message Authentication Code - Symmetric enc + Hash






42. Similar to RSA - very efficient for low end hardware/limited processing power.






43. Similar to OFB-insteat of a static IV- a counter is incremented with each data block ;each block XORed with unique keystream value; no chaining; encryption of block s can happen in parallel used in IPSEc and implemented in 802.11i wireless






44. Data in readable format- red side






45. Mathematical operation performed several times on the same message block






46. 64 bit blocks of data; variable key lengths






47. Has authority to remove keys from escrow;






48. Uses asymmetric to figure out a key - symmetric used for large data encryption.






49. Prove knowledge of a fact to a third party without revealing the fact itself






50. Encrypted data-black side