Test your basic knowledge |

CISSP Crypto Domain

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. OCSP; OSPF- routing protocol; Online Vulnerability Assessment Language; Orthogonal Frequency Division Multiplexing

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


2. Block based - adds padding - same key - same clear = same ciphertext






3. Buries a message by taking the least significant bit of evvery byte to carry the message; hide a message in another message. Graphics; sound files; alternated used in corporate espionage






4. Stream cipher; stream algorithm works one bit at a time usually done in Hardware; no memory required; very fast; block cipher; works on blocks of bits; transforms into fixed length blocks; encrypted block by block 64; 128; 256 uses substitution and t






5. Data Encryption Standard - 64 bit blocks - 56 bit key - 16 rounds - 4 modes






6. Broken






7. First public key algorithm; not used for message encrypt or digital signatures; uses large prime numbers; requires both sender and reciever to have key pairs; vulnerable to man in the middle attacks






8. A specific proceedure






9. Advanced Encryption Standard - replaced DES - Rijndael based - 128 - 192 - and 256 bit keys/blocks with 10 - 12 - 14 rounds resp.






10. Asymmetric enc + Hash - validity of message - non repudiation






11. Used with keys; do not need to be encypted; required to prevent defeat of keyspace through pattern analysis






12. Authentication and integrity - needed when... At rest and in transit.






13. 1996 - crypto is protected in agreement.






14. Rivest-Shamir-Adleman - factorization - used for encryption - key exchange and digital signature.






15. Placementof a secret copy in a secure location






16. RSA; El Gamal; ECC; Diffe Hellman; DSA






17. Formula is public; used to creat checksums; message digests; or integrity check values






18. Numeric seeding value used to with a symmetric key to provide randomness






19. International Data Enc Algorithm - 64 bit block - 128 bit key






20. Certificate Authority; registration authority offloads work; validates identity; distributes key; certificate server maintains repository that stores certificates






21. Message hidden within larger context.






22. Rearranges bits or bytes






23. Online Certificate Status Protocol- used to query the CA; useful in large; complex environments; responds to a query with status of valid; suspended; or revoked






24. Replaces bits characters and block s with differecnt values






25. Rearrances the bits characters or character blocks






26. Science of protecting information by encoding it






27. Set symbol size usually 64 bits






28. Uses asymmetric to figure out a key - symmetric used for large data encryption.






29. Eliptical Curve Cryptography; encryption; dig signatures and key exchange;highest strength per bit of key length; most efficient;160 bit el gamal= 1024 RSA-used in wireless devices use






30. Keys needed to decrypt cyphertext so an authorized third party can gain access






31. Integrity






32. Estimated time resources to break a cryptosystem






33. Different keys for encryption and decryption; two keys private and public Encrypt with private- unencrypt with privateor encrypt with public- decrypt with private. Use of private ensures non repudiation; without confidentiality-becomes the digital si






34. Message Authentication Code - Symmetric enc + Hash






35. Set of mathmatical rules used in encryption






36. Authenticity - integrity - digital signatures - storing passwords.






37. Cert Revocation List- identifies Certs that are no longer recognized; maintained and updated periodically; Browsers use OCSP for updates.






38. Similar to RSA - very efficient for low end hardware/limited processing power.






39. Encrypted data-black side






40. Hash Mess Auth Code (512bit MD5; SHA-1); calculated using a hash function with secret key- shared key appended to data shared faster than DES CBC- used in IPSEC SSL/TLS and SSH






41. International Data Encryption Algorithm- operateson 64 bit blocks-uses 128 bit key and is faster than DES; used in PGP and other software; no successful attacks






42. Setting policies; protecting keys; key recovery; responding to key compromise; keys long enough to prevent attack; cryptoperiod: key lifetimes






43. Cannot deny ownership / origination.






44. Upgrade to DES; Replaced by AES; takes three times longer to encrypt






45. Large set of possible values used to construct keys






46. NIST and NSA - 160 bit digest






47. Monsidered unbreakable- each pad made up of truly random values; used once; securely distributed- protected at sender and reciever sites






48. Centralized key mgt key issuer; keeps copy of keys or decentralized key mgt; end user generates keys and submits to CA;does not provide for key escrow; no recovery possible






49. Function that takes a variable length string; and compresses and transforms it into a fixed length- output called a hash or message digest






50. Confidentiality - Authentication - Non-Repudiation