SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Crypto Domain
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Spartans - wrapped around rod.
MD5
cert contents
blowfish
scytale
2. Integrity Check Value-makes the hash with the hash algorithm
ICV
cryptovariable
Cipher Feedback Mode
collision
3. Hardware - software - and policies (security association) -
CAST
Public Key Infrastructure
hybrid encrypt features
Output Feedback Mode
4. Malled online encryption or traffic flow security- implemented in hardware' encrypts all traffic in a single path
Lucifer
link encryption
el gamal
Trap Door Function
5. Data Encryption Standard (DES) 5 Block Modes; Trple DES runs through it three times; Blowfish; IDEA; RC4; RC5
symmetric algorithms types
key mgmt mechanisms
Cipher Block Chaining
key space
6. Eliptical Curve Cryptography; encryption; dig signatures and key exchange;highest strength per bit of key length; most efficient;160 bit el gamal= 1024 RSA-used in wireless devices use
birthday paradox
ECC
Blowfish
concealment cipher
7. Rives Shamir; adleman- based on factoring of large prime numbers-encrypt-dig sig- and key exchange variable key length 512 to 4096- strong but slow; 100 times slower than software; 1000-10000 slower than hardware encryption
brute force attack on hashing
RSA
collision
steganography
8. Set of mathmatical rules used in encryption
scytale
one time pad
algorithm
message hashing
9. Numeric seeding value used to with a symmetric key to provide randomness
key mgmt tasks
Digital Signature Standard
initialization vector/salt
3DES
10. Encryption - decryption - signing - verifying
steganography
ciphertext
Asymmetric uses
Hash Function Uses
11. Polyalphabetic - substitution - 2d grid of alphabet
vigenere cipher
Elliptical Curve Cryptosystem
key escrow
confusion
12. Stream cipher; stream algorithm works one bit at a time usually done in Hardware; no memory required; very fast; block cipher; works on blocks of bits; transforms into fixed length blocks; encrypted block by block 64; 128; 256 uses substitution and t
symmetric algorithms types
initialization vector/salt
OCSP
symetric
13. Output feedback; emulates stream cipher; similar to CFB except qty XORed; with each plaintext block; IV used as a seed; then keystream used as IV in continuing process
Hybrid Encryption
key storage
steganography
DES OFB
14. Integrity
3DES
message hashing
initialization vector/salt
hashing algorithm
15. Message Authentication Code - Symmetric enc + Hash
HMAC
steganography
cryptology
blowfish
16. Monsidered unbreakable- each pad made up of truly random values; used once; securely distributed- protected at sender and reciever sites
cryptography
hybrid encrypt features
kerckhoffs principle
one time pad
17. Keys needed to decrypt cyphertext so an authorized third party can gain access
ECC
steganography
ONE time pad problems
key escrow
18. Letters represented by numerical place in the alphabet
OCSP
CRL
kerckhoffs principle
modular mathematics
19. Secret; single; conventional; session; shared; private
symetric synonyms
cryptography
link encryption
steganography
20. Authentication and integrity - needed when... At rest and in transit.
El Gamal
caesar cipher
signature
key mgmt mechanisms
21. Large set of possible values used to construct keys
blowfish
key space
key escrow
monoalphabetic
22. Similar to OFB-insteat of a static IV- a counter is incremented with each data block ;each block XORed with unique keystream value; no chaining; encryption of block s can happen in parallel used in IPSEc and implemented in 802.11i wireless
key space
DES CTR
caesar cipher
Hash
23. Placementof a secret copy in a secure location
algorithm
key storage
Cipher Block Chaining
Hash Function Uses
24. Mathematical operation performed several times on the same message block
substitution cipher
IDEA
key space
rounds
25. RSA
prime factorization
Exclusive Or(XOR)
initialization vector/salt
certificate practice statement
26. Both parties have same key(kept secret) exchage keys before comms begins; faster than asymmetric crypto; best suited for bulk encryption; N(N-1)/2 is the number of keys needed; File Encryption Key (FEK)
key space
collision
MD5
symmetric Crypto
27. Process of properly destroying keys at end of userful loife
El Gamal
key archival
prime factorization
Key zeroization
28. Prove knowledge of a fact to a third party without revealing the fact itself
MD5
zero knowledge proof
IDEA
scytale
29. Instance when two keys keys generate the same ciphertext from same plaintext
prime factorization
Public Key Infrastructure
key clustering
crypto services
30. Public algorithm - private key.
ICV
kerckhoffs principle
3DES
cryptography
31. Formula is public; used to creat checksums; message digests; or integrity check values
CA
hashing algorithm strengths
FIPS 186
SHA2
32. DES - 3des - aes - idea - two fish - rc4 - blow fish
certificate practice statement
hybrid encrypt features
Symmetric Algorithms
zero knowledge proof
33. Carlisle Adams and Stafford Tavares; CAST 128 64 bit block cipher-uses keys between 48 and 128 bit lengths 12 to 16 rounds of operations CAST 256 uses 48 rounds; of 128; 192; 160; 224; 256
CAST
recovery agent
Block Cipher
Symmetric Algorithms
34. Symmetric for Bulk Encrypt; assym for key encapsulation- used in SSL; Email; key exchange
wassenaar arrangement
Common Hash Algorithms
hybrid encrypt features
Electronic Code Book
35. 128 bit digest
asymmetric algorithms
wassenaar arrangement
MD5
Digital Signature Standard Algorithms
36. RC(x) - 32 - 64 - 128 bit blocks - key max at 2048 bits
polyalphabetic
Rivest Cipher
IDEA
CAST
37. Science of protecting information by encoding it
Block Cipher
cryptography
El Gamal
transposition/permutation cipher
38. Advanced Encryption Standard
RiJndael(AES)
initialization vector/salt
ECC
trust model types
39. Advanced Encryption Standard - replaced DES - Rijndael based - 128 - 192 - and 256 bit keys/blocks with 10 - 12 - 14 rounds resp.
wassenaar arrangement
message hashing
AES
modular mathematics
40. One-way - difficult to solve - uses factorization - private key can compute the public key
work factor
Trap Door Function
Digital Signature Standard
data transmission
41. Set symbol size usually 64 bits
Elliptical Curve Cryptosystem
Block Cipher
DES CFB
3DES
42. Buries a message by taking the least significant bit of evvery byte to carry the message; hide a message in another message. Graphics; sound files; alternated used in corporate espionage
CRL
CA
collision
steganography
43. 48 rounds - 2 or 3 keys - enc enc enc (EEE) - or enc dec enc (EDE)
cryptanalysis
diffusion
IDEA
3DES
44. 32 to 448 bit key - Schneier
scytale
AES
substitution cipher
Blowfish
45. Confidentiality - Authentication - Non-Repudiation
one time pad
Asymmetric Enc provides
RSA
cert contents
46. Looks for patterns in ciphertext to discover the key.
asymmetric key encryption
frequency analysis
vigenere cipher
key mgmgt defined
47. Message Authentication codes; aka message integrity code; modification detection code; cryptographic checksum; generated by running message through secret key(DES CBC) MAC is the last block generated by algorithm 64 bit
substitution cipher
CBC MAC
Diffie-Hellman Algorithm
substitution cipher
48. NIST 1991 - outlines authorized algorithms
HMAC
Block Cipher
Digital Signature Standard
data transmission
49. Secret sequence of bits and instructions used to encrypt/decrypt
transposition/permutation cipher
cryptovariable
confusion
historical highlights
50. Public Key Infrastructure- Developed to provide standards for key generation; authentication; x.509 non used with Pretty Good Privacy; good private good "web of trust"
steganography
PKI
RSA
ONE time pad problems