SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Crypto Domain
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Cert Revocation List- identifies Certs that are no longer recognized; maintained and updated periodically; Browsers use OCSP for updates.
running key
4 O's
CRL
Block Cipher
2. Online Certificate Status Protocol- used to query the CA; useful in large; complex environments; responds to a query with status of valid; suspended; or revoked
DES OFB
AES
hybrid encrypt features
OCSP
3. Cipher Block Chaining- most common mode of DES loaded sequenctially- XORed using 64 bit initialization vector- first ciphertext XORed with next text block- since IV different;ciphertext different
DES CBC
Diffe Helman
Common Hash Algorithms
frequency analysis
4. Replaces bits characters and block s with differecnt values
key mgmgt defined
polyalphabetic
substitution cipher
PKI
5. Provided by mixing key values during repeated rounds of encryption
ICV
ciphertext
symetric
confusion
6. Prove knowledge of a fact to a third party without revealing the fact itself
ICV
zero knowledge proof
hashing algorithm
concealment cipher
7. Secret sequence of bits and instructions used to encrypt/decrypt
monoalphabetic
Hash
cryptovariable
RiJndael(AES)
8. OCSP; OSPF- routing protocol; Online Vulnerability Assessment Language; Orthogonal Frequency Division Multiplexing
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
9. Similar to RSA - very efficient for low end hardware/limited processing power.
Elliptical Curve Cryptosystem
running key
Hybrid Encryption
brute force attack on hashing
10. Hardware - software - and policies (security association) -
Public Key Infrastructure
CAST
Diffie-Hellman Algorithm
ONE time pad problems
11. Binary operation that adds bits together; plaintext is XORed with a random keystream to generate cyphertext
message hashing
Exclusive Or(XOR)
el gamal
cryptology
12. Asymmetric enc + Hash - validity of message - non repudiation
collision
symetric
Signature
ICV
13. A specific proceedure
hashing algorithm
key mgmgt defined
Diffe Helman
algorithm
14. NIST 1991 - outlines authorized algorithms
Output Feedback Mode
Digital Signature Standard
plaintext
DES CBC
15. 1996 - crypto is protected in agreement.
zero knowledge proof
wassenaar arrangement
DES ECB
Asymmetric Enc provides
16. Message hidden within larger context.
concealment cipher
blowfish
REED D asym algorithms
Public Key Infrastructure
17. First public key algorithm; not used for message encrypt or digital signatures; uses large prime numbers; requires both sender and reciever to have key pairs; vulnerable to man in the middle attacks
ciphertext
Diffe Helman
frequency analysis
Common Hash Algorithms
18. Hides data in images - usually by LSB (least significant bit)
steganography
blowfish
monoalphabetic
MD5
19. 32 to 448 bit key - Schneier
DES CTR
Knapsack
Blowfish
RSA
20. Simple substitution - ROT-n - mono-alphabetical.
caesar cipher
Knapsack
vernam cipher
OCSP
21. Operates on bits - higher speed - usually implemented in hardware.
non-repudiation
key mgmgt defined
zero knowledge proof
Stream Cipher
22. Stream cipher; stream algorithm works one bit at a time usually done in Hardware; no memory required; very fast; block cipher; works on blocks of bits; transforms into fixed length blocks; encrypted block by block 64; 128; 256 uses substitution and t
DES CFB
asymmetric algorithms
diffusion
symmetric algorithms types
23. Mathematical operation performed several times on the same message block
3DES
crypto services
steganography
rounds
24. Integrity Check Value-makes the hash with the hash algorithm
RSA
running key
key archival
ICV
25. Instance when two keys keys generate the same ciphertext from same plaintext
caesar cipher
key clustering
rounds
hashing algorithm strengths
26. RSA
plaintext
DES CFB
prime factorization
4 O's
27. Data Encryption Standard - 64 bit blocks - 56 bit key - 16 rounds - 4 modes
HMAC
3DES
DES
Diffie-Hellman Algorithm
28. Advanced Encryption Standard - replaced DES - Rijndael based - 128 - 192 - and 256 bit keys/blocks with 10 - 12 - 14 rounds resp.
data transmission
key mgmgt defined
AES
symetric synonyms
29. Setting policies; protecting keys; key recovery; responding to key compromise; keys long enough to prevent attack; cryptoperiod: key lifetimes
key mgmgt defined
CAST
substitution cipher
key mgmt mechanisms
30. Measar cipher
DES CFB
Hash Function Uses
cryptography
monoalphabetic
31. Data Encryption Standard (DES) 5 Block Modes; Trple DES runs through it three times; Blowfish; IDEA; RC4; RC5
IDEA
asymmetric key encryption
symmetric algorithms types
crypto services
32. Digital signature standard; performs integrity by SHA; uses DSA; RSA;Elyp CurveDSA
SHA2
FIPS 186
vigenere cipher
key mgmgt defined
33. Link Encryption and end to end encryption
4 O's
symmetric algorithms types
cryptography
data transmission
34. Centralized key mgt key issuer; keeps copy of keys or decentralized key mgt; end user generates keys and submits to CA;does not provide for key escrow; no recovery possible
message hashing
symmetric algorithms types
key mgmt mechanisms
DES CBC
35. Single authority trust; heirarchal trust; web of trust; hybrid cross certificationusesd in businesses to trust each others CA's; and DISA Model Root; intermediate; leaf at the local levels
trust model types
certificate practice statement
PKI
HAVAL
36. Data in readable format- red side
plaintext
key mgmt mechanisms
Output Feedback Mode
Elliptical Curve Cryptosystem
37. SHA - RSA - Eliptical Curve (ECDSA)
Digital Signature Standard Algorithms
cryptovariable
scytale
symetric
38. Each pair of entities must receive in secure fashion; requires more overhead than worth; key distro challenging- sender recievermust be on the same sheet
prime factorization
crypto services
Asymmetric Enc provides
ONE time pad problems
39. Stream based - also uses prior cypher text to seed
Elliptical Curve Cryptosystem
cryptography
Cipher Feedback Mode
link encryption
40. One time pad - random key - one use - unbreakable
blowfish
vernam cipher
transposition/permutation cipher
ciphertext
41. Science of protecting information by encoding it
concealment cipher
cryptanalysis
steganography
cryptography
42. Block based - Previous block seeds next blocks key
Cipher Block Chaining
ICV
crypto services
cryptography
43. Set symbol size usually 64 bits
CBC MAC
DES CTR
AES
Block Cipher
44. Looks for patterns in ciphertext to discover the key.
initialization vector/salt
frequency analysis
El Gamal
Symmetric Algorithms
45. Relies on finding weaknesses in the hashing algorithm
non-repudiation
brute force attack on hashing
Block Cipher
DES CBC
46. Authenticity - integrity - digital signatures - storing passwords.
cryptography
wassenaar arrangement
Hash Function Uses
end to end enccryption
47. Set of mathmatical rules used in encryption
algorithm
RSA
Block Cipher
collision
48. Placementof a secret copy in a secure location
FIPS 186
steganography
ONE time pad problems
key storage
49. Rivest-Shamir-Adleman - factorization - used for encryption - key exchange and digital signature.
Block Cipher
RSA
Exclusive Or(XOR)
non-repudiation
50. Cipher Feedback Emulates stream cipher data encrypted in smaller units than block size; plaintext pattersn concealed in XOR; previous ciphertext block is encrypted and output produced is conbined with plaintext block using XOR-to produce next ciphert
Signature
modular mathematics
scytale
DES CFB