SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Crypto Domain
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Storage of keys and certs for extended period of time-normally performed by CA a trusted third party; or key holder
plaintext
El Gamal
key archival
RiJndael(AES)
2. Broken
3DES
transposition/permutation cipher
Knapsack
key mgmt tasks
3. Provided by mixing key values during repeated rounds of encryption
FIPS 186
Blowfish
hybrid encrypt features
confusion
4. Centralized key mgt key issuer; keeps copy of keys or decentralized key mgt; end user generates keys and submits to CA;does not provide for key escrow; no recovery possible
one time pad
key mgmt mechanisms
FIPS 186
collision
5. Malled online encryption or traffic flow security- implemented in hardware' encrypts all traffic in a single path
link encryption
IDEA
CA
Cipher Feedback Mode
6. Advanced Encryption Standard - replaced DES - Rijndael based - 128 - 192 - and 256 bit keys/blocks with 10 - 12 - 14 rounds resp.
AES
ciphertext
initialization vector/salt
symmetric algorithms types
7. Public algorithm - private key.
Public Key Infrastructure
symmetric algorithms types
key mgmt mechanisms
kerckhoffs principle
8. Stream based - also uses prior cypher text to seed
confusion
Cipher Feedback Mode
signature
key mgmt tasks
9. First public key algorithm; not used for message encrypt or digital signatures; uses large prime numbers; requires both sender and reciever to have key pairs; vulnerable to man in the middle attacks
cryptography
initialization vector/salt
Cipher Block Chaining
Diffe Helman
10. 128 bit encryption; on 16 rounds of encryption; key size of 64 bits 8 parity; 56 bits long
running key
Lucifer
HMAC
blowfish
11. NIST and NSA - 160 bit digest
SHA1
digital signatures
Rivest Cipher
CA
12. Eliptical Curve Cryptography; encryption; dig signatures and key exchange;highest strength per bit of key length; most efficient;160 bit el gamal= 1024 RSA-used in wireless devices use
SHA2
polyalphabetic
ECC
CA
13. Digital signature standard; performs integrity by SHA; uses DSA; RSA;Elyp CurveDSA
initialization vector/salt
cryptography
transposition/permutation cipher
FIPS 186
14. Stream based - errors do not propagate across blocks
non-repudiation
confusion
Output Feedback Mode
ONE time pad problems
15. Advanced Encryption Standard
RiJndael(AES)
asymmetric algorithms
key archival
el gamal
16. Cipher Feedback Emulates stream cipher data encrypted in smaller units than block size; plaintext pattersn concealed in XOR; previous ciphertext block is encrypted and output produced is conbined with plaintext block using XOR-to produce next ciphert
Exclusive Or(XOR)
DES CFB
recovery agent
Symmetric Algorithms
17. Both parties have same key(kept secret) exchage keys before comms begins; faster than asymmetric crypto; best suited for bulk encryption; N(N-1)/2 is the number of keys needed; File Encryption Key (FEK)
ICV
Blowfish
polyalphabetic
symmetric Crypto
18. Online Certificate Status Protocol- used to query the CA; useful in large; complex environments; responds to a query with status of valid; suspended; or revoked
signature
frequency analysis
OCSP
FIPS 186
19. Attmpts to conceal data by hiding it; Used by placing information in objectssuch as graphics; sound files or document headers
signature
key storage
steganography
3DES
20. Pro's: key management cons: speed/file size
key space
Key zeroization
asymmetric key encryption
4 O's
21. One key - only confidentiality
symetric
CRL
symmetric algorithms types
cryptography
22. Different keys for encryption and decryption; two keys private and public Encrypt with private- unencrypt with privateor encrypt with public- decrypt with private. Use of private ensures non repudiation; without confidentiality-becomes the digital si
wassenaar arrangement
confusion
work factor
asymmetric algorithms
23. CIA plus non repudiation
crypto services
Diffie-Hellman Algorithm
modular mathematics
Public Key Infrastructure
24. Used with keys; do not need to be encypted; required to prevent defeat of keyspace through pattern analysis
FIPS 186
brute force attack on hashing
initialization vector/salt
DES
25. Formula is public; used to creat checksums; message digests; or integrity check values
vernam cipher
3DES
hashing algorithm strengths
running key
26. 1996 - crypto is protected in agreement.
Digital Signature Standard
caesar cipher
wassenaar arrangement
RSA
27. Uses Lucas functions.
PKI
key escrow
LUC
Signature
28. Relies on finding weaknesses in the hashing algorithm
Symmetric Algorithms
AES
vernam cipher
brute force attack on hashing
29. Instance when two keys keys generate the same ciphertext from same plaintext
CBC MAC
one time pad
blowfish
key clustering
30. DES - 3des - aes - idea - two fish - rc4 - blow fish
vernam cipher
concealment cipher
Symmetric Algorithms
key mgmt mechanisms
31. Data Encryption Standard - 64 bit blocks - 56 bit key - 16 rounds - 4 modes
DES
Block Cipher
brute force attack on hashing
work factor
32. 256 or 512-bit digest
HAVAL
ECC
SHA2
steganography
33. Rives Shamir; adleman- based on factoring of large prime numbers-encrypt-dig sig- and key exchange variable key length 512 to 4096- strong but slow; 100 times slower than software; 1000-10000 slower than hardware encryption
vigenere cipher
data transmission
RSA
monoalphabetic
34. Hash Mess Auth Code (512bit MD5; SHA-1); calculated using a hash function with secret key- shared key appended to data shared faster than DES CBC- used in IPSEC SSL/TLS and SSH
HMAC
Cipher Block Chaining
monoalphabetic
signature
35. Modified md5 - v means "variable"
one time pad
HAVAL
Digital Signature Standard Algorithms
3DES
36. RSA
Cipher Block Chaining
key archival
certificate practice statement
prime factorization
37. One-way - difficult to solve - uses factorization - private key can compute the public key
signature
link encryption
Trap Door Function
symetric synonyms
38. Keyword: integrity
REED D asym algorithms
3DES
Hash
Key zeroization
39. Operates on bits - higher speed - usually implemented in hardware.
Stream Cipher
Digital Signature Standard
historical highlights
Hash Function Uses
40. Cert Revocation List- identifies Certs that are no longer recognized; maintained and updated periodically; Browsers use OCSP for updates.
HMAC
HAVAL
CRL
SHA2
41. Message Authentication Code - Symmetric enc + Hash
plaintext
cryptovariable
HMAC
Key zeroization
42. Similar to RSA - very efficient for low end hardware/limited processing power.
Elliptical Curve Cryptosystem
cert contents
ONE time pad problems
LUC
43. Similar to OFB-insteat of a static IV- a counter is incremented with each data block ;each block XORed with unique keystream value; no chaining; encryption of block s can happen in parallel used in IPSEc and implemented in 802.11i wireless
ICV
cryptovariable
DES CTR
vernam cipher
44. Data in readable format- red side
plaintext
key storage
digital signatures
Diffe Helman
45. Mathematical operation performed several times on the same message block
Hash
rounds
RSA
DES CBC
46. 64 bit blocks of data; variable key lengths
kerckhoffs principle
key storage
DES ECB
blowfish
47. Has authority to remove keys from escrow;
collision
key mgmt mechanisms
recovery agent
CRL
48. Uses asymmetric to figure out a key - symmetric used for large data encryption.
Hybrid Encryption
blowfish
transposition cipher
end to end enccryption
49. Prove knowledge of a fact to a third party without revealing the fact itself
RiJndael(AES)
zero knowledge proof
wassenaar arrangement
Block Cipher
50. Encrypted data-black side
link encryption
IDEA
ciphertext
Diffe Helman