Test your basic knowledge |

CISSP Crypto Domain

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Each pair of entities must receive in secure fashion; requires more overhead than worth; key distro challenging- sender recievermust be on the same sheet






2. Science of breakin the code






3. No plaintext exposure; encrypted at source; VPN; SSL ;SSH






4. Both parties have same key(kept secret) exchage keys before comms begins; faster than asymmetric crypto; best suited for bulk encryption; N(N-1)/2 is the number of keys needed; File Encryption Key (FEK)






5. NIST 1991 - outlines authorized algorithms






6. Rearranges bits or bytes






7. Set of mathmatical rules used in encryption






8. variable block and key sizes 128; 192; 256; uses a variable number of rounds; has low memory requirements; easy to defend against timing attacks; implemented in software; hardware is costly.






9. Science of protecting information by encoding it






10. Published document describing: howa CA is structured;which standards are used and how certs are managed






11. Message Authentication codes; aka message integrity code; modification detection code; cryptographic checksum; generated by running message through secret key(DES CBC) MAC is the last block generated by algorithm 64 bit






12. Encryption - decryption - signing - verifying






13. RSA






14. Looks for patterns in ciphertext to discover the key.






15. Advanced Encryption Standard






16. Measar cipher






17. 1996 - crypto is protected in agreement.






18. One key - only confidentiality






19. Link Encryption and end to end encryption






20. Similar to RSA - very efficient for low end hardware/limited processing power.






21. Attmpts to conceal data by hiding it; Used by placing information in objectssuch as graphics; sound files or document headers






22. key storage;escrow;archival;recovery agend;multiple key pairs






23. Certificate Authority; registration authority offloads work; validates identity; distributes key; certificate server maintains repository that stores certificates






24. Relies on finding weaknesses in the hashing algorithm






25. Based on diffie-hellman - encryption - digital signatures and key exchange.






26. Authentication and integrity - needed when... At rest and in transit.






27. Authenticity - integrity - digital signatures - storing passwords.






28. Confidentiality - Authentication - Non-Repudiation






29. Upgrade to DES; Replaced by AES; takes three times longer to encrypt






30. Setting policies; protecting keys; key recovery; responding to key compromise; keys long enough to prevent attack; cryptoperiod: key lifetimes






31. Digital signature standard; performs integrity by SHA; uses DSA; RSA;Elyp CurveDSA






32. Hash Mess Auth Code (512bit MD5; SHA-1); calculated using a hash function with secret key- shared key appended to data shared faster than DES CBC- used in IPSEC SSL/TLS and SSH






33. Data Encryption Standard - 64 bit blocks - 56 bit key - 16 rounds - 4 modes






34. Easily transportable;cannot be initiated by something else; can be automatically time stamped;provides integrity by encrypting hash value;hash value generated with senders private key






35. Uses Lucas functions.






36. DES - 3des - aes - idea - two fish - rc4 - blow fish






37. NIST and NSA - 160 bit digest






38. Rives Shamir; adleman- based on factoring of large prime numbers-encrypt-dig sig- and key exchange variable key length 512 to 4096- strong but slow; 100 times slower than software; 1000-10000 slower than hardware encryption






39. Numeric seeding value used to with a symmetric key to provide randomness






40. Encrypted data-black side






41. Keys needed to decrypt cyphertext so an authorized third party can gain access






42. Based on Dif Hel; provides encrypt; dig sig; and key exchange; discrete logarithms-easy to reverse engineer; main drawback is performance- slower than other algorithms






43. Monsidered unbreakable- each pad made up of truly random values; used once; securely distributed- protected at sender and reciever sites






44. Replaces bits characters and block s with differecnt values






45. 32 to 448 bit key - Schneier






46. Advanced Encryption Standard - replaced DES - Rijndael based - 128 - 192 - and 256 bit keys/blocks with 10 - 12 - 14 rounds resp.






47. Secret; single; conventional; session; shared; private






48. Hides data in images - usually by LSB (least significant bit)






49. 48 rounds - 2 or 3 keys - enc enc enc (EEE) - or enc dec enc (EDE)






50. Estimated time resources to break a cryptosystem