Test your basic knowledge |

CISSP Crypto Domain

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Uses Lucas functions.






2. One time pad - random key - one use - unbreakable






3. Advanced Encryption Standard - replaced DES - Rijndael based - 128 - 192 - and 256 bit keys/blocks with 10 - 12 - 14 rounds resp.






4. Hides data in images - usually by LSB (least significant bit)






5. Authenticity - integrity - digital signatures - storing passwords.






6. Authentication and integrity - needed when... At rest and in transit.






7. key storage;escrow;archival;recovery agend;multiple key pairs






8. Broken






9. Rives Shamir; adleman- based on factoring of large prime numbers-encrypt-dig sig- and key exchange variable key length 512 to 4096- strong but slow; 100 times slower than software; 1000-10000 slower than hardware encryption






10. Formula is public; used to creat checksums; message digests; or integrity check values






11. 64 bit blocks of data; variable key lengths






12. Public algorithm - private key.






13. Operates on bits - higher speed - usually implemented in hardware.






14. Measar cipher






15. Centralized key mgt key issuer; keeps copy of keys or decentralized key mgt; end user generates keys and submits to CA;does not provide for key escrow; no recovery possible






16. Based on probability with 23 people 50% chance 2 will have same birthday






17. One key - only confidentiality






18. Hardware - software - and policies (security association) -






19. DES - 3des - aes - idea - two fish - rc4 - blow fish






20. MD5 - SHA1






21. 256 or 512-bit digest






22. First public key algorithm; not used for message encrypt or digital signatures; uses large prime numbers; requires both sender and reciever to have key pairs; vulnerable to man in the middle attacks






23. Letters represented by numerical place in the alphabet






24. Encrypted data-black side






25. First public key exchange system - users exchange keys over insecure medium.






26. Function that takes a variable length string; and compresses and transforms it into a fixed length- output called a hash or message digest






27. Pro's: key management cons: speed/file size






28. Instance when two keys keys generate the same ciphertext from same plaintext






29. Uses asymmetric to figure out a key - symmetric used for large data encryption.






30. Storage of keys and certs for extended period of time-normally performed by CA a trusted third party; or key holder






31. Symmetric for Bulk Encrypt; assym for key encapsulation- used in SSL; Email; key exchange






32. Rearranges bits or bytes






33. When a hash fuunction generates same output for same input






34. Similar to RSA - very efficient for low end hardware/limited processing power.






35. Large set of possible values used to construct keys






36. Data in readable format- red side






37. Block based - Previous block seeds next blocks key






38. Electronic Code Book Each block encrypted independently; 64 bits at a time; using same key; given message; always same ciphertext; susceptible to plaintext attack






39. No plaintext exposure; encrypted at source; VPN; SSL ;SSH






40. RSA; El Gamal; ECC; Diffe Hellman; DSA






41. Message hidden within larger context.






42. Single authority trust; heirarchal trust; web of trust; hybrid cross certificationusesd in businesses to trust each others CA's; and DISA Model Root; intermediate; leaf at the local levels






43. Certificate Authority; registration authority offloads work; validates identity; distributes key; certificate server maintains repository that stores certificates






44. Science of breakin the code






45. Simple substitution - ROT-n - mono-alphabetical.






46. Public Key Infrastructure- Developed to provide standards for key generation; authentication; x.509 non used with Pretty Good Privacy; good private good "web of trust"






47. Data Encryption Standard - 64 bit blocks - 56 bit key - 16 rounds - 4 modes






48. Binary operation that adds bits together; plaintext is XORed with a random keystream to generate cyphertext






49. 32 to 448 bit key - Schneier






50. Integrity Check Value-makes the hash with the hash algorithm