Test your basic knowledge |

CISSP Crypto Domain

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. NIST 1991 - outlines authorized algorithms






2. Simple substitution - ROT-n - mono-alphabetical.






3. Authentication and integrity - needed when... At rest and in transit.






4. Message Authentication codes; aka message integrity code; modification detection code; cryptographic checksum; generated by running message through secret key(DES CBC) MAC is the last block generated by algorithm 64 bit






5. 48 rounds - 2 or 3 keys - enc enc enc (EEE) - or enc dec enc (EDE)






6. A specific proceedure






7. Data Encryption Standard - 64 bit blocks - 56 bit key - 16 rounds - 4 modes






8. Numeric seeding value used to with a symmetric key to provide randomness






9. 32 to 448 bit key - Schneier






10. Polyalphabetic - substitution - 2d grid of alphabet






11. Measar cipher






12. Data in readable format- red side






13. Hardware - software - and policies (security association) -






14. Looks for patterns in ciphertext to discover the key.






15. Centralized key mgt key issuer; keeps copy of keys or decentralized key mgt; end user generates keys and submits to CA;does not provide for key escrow; no recovery possible






16. When a hash fuunction generates same output for same input






17. One-way - difficult to solve - uses factorization - private key can compute the public key






18. Cipher Feedback Emulates stream cipher data encrypted in smaller units than block size; plaintext pattersn concealed in XOR; previous ciphertext block is encrypted and output produced is conbined with plaintext block using XOR-to produce next ciphert






19. RC(x) - 32 - 64 - 128 bit blocks - key max at 2048 bits






20. NIST and NSA - 160 bit digest






21. Hash Mess Auth Code (512bit MD5; SHA-1); calculated using a hash function with secret key- shared key appended to data shared faster than DES CBC- used in IPSEC SSL/TLS and SSH






22. No plaintext exposure; encrypted at source; VPN; SSL ;SSH






23. Attmpts to conceal data by hiding it; Used by placing information in objectssuch as graphics; sound files or document headers






24. Prevent disclosure - privacy






25. Placementof a secret copy in a secure location






26. Encrypted data-black side






27. First public key algorithm; not used for message encrypt or digital signatures; uses large prime numbers; requires both sender and reciever to have key pairs; vulnerable to man in the middle attacks






28. Carlisle Adams and Stafford Tavares; CAST 128 64 bit block cipher-uses keys between 48 and 128 bit lengths 12 to 16 rounds of operations CAST 256 uses 48 rounds; of 128; 192; 160; 224; 256






29. MD5 - SHA1






30. Upgrade to DES; Replaced by AES; takes three times longer to encrypt






31. Integrity Check Value-makes the hash with the hash algorithm






32. Cert Revocation List- identifies Certs that are no longer recognized; maintained and updated periodically; Browsers use OCSP for updates.






33. Based on diffie-hellman - encryption - digital signatures and key exchange.






34. Spartans - wrapped around rod.






35. First public key exchange system - users exchange keys over insecure medium.






36. Rearranges bits or bytes






37. Different keys for encryption and decryption; two keys private and public Encrypt with private- unencrypt with privateor encrypt with public- decrypt with private. Use of private ensures non repudiation; without confidentiality-becomes the digital si






38. Study of both cryptography and cryptanalysis






39. 1996 - crypto is protected in agreement.






40. Estimated time resources to break a cryptosystem






41. 128 bit encryption; on 16 rounds of encryption; key size of 64 bits 8 parity; 56 bits long






42. RSA






43. Science of protecting information by encoding it






44. Link Encryption and end to end encryption






45. Advanced Encryption Standard - replaced DES - Rijndael based - 128 - 192 - and 256 bit keys/blocks with 10 - 12 - 14 rounds resp.






46. variable block and key sizes 128; 192; 256; uses a variable number of rounds; has low memory requirements; easy to defend against timing attacks; implemented in software; hardware is costly.






47. Provided by mixing up the location of plaintext throughout the cipher






48. Credentials that allow verification; contains serial no; ident info; dig signature;lifetime dates;public key of the cert holder






49. Based on probability with 23 people 50% chance 2 will have same birthday






50. Message Authentication Code - Symmetric enc + Hash