SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Crypto Domain
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Replaces bits characters and block s with differecnt values
MD5
substitution cipher
Knapsack
Asymmetric Enc provides
2. Upgrade to DES; Replaced by AES; takes three times longer to encrypt
3DES
FIPS 186
PKI
RiJndael(AES)
3. Confidentiality - Authentication - Non-Repudiation
Asymmetric Enc provides
RSA
birthday paradox
algorithm
4. Certificate Authority; registration authority offloads work; validates identity; distributes key; certificate server maintains repository that stores certificates
prime factorization
CA
substitution cipher
certificate practice statement
5. Polyalphabetic - substitution - 2d grid of alphabet
hashing algorithm strengths
vigenere cipher
plaintext
link encryption
6. Based on probability with 23 people 50% chance 2 will have same birthday
ECC
birthday paradox
Key zeroization
DES CFB
7. Similar to OFB-insteat of a static IV- a counter is incremented with each data block ;each block XORed with unique keystream value; no chaining; encryption of block s can happen in parallel used in IPSEc and implemented in 802.11i wireless
DES CTR
Block Cipher
cryptovariable
El Gamal
8. Message Authentication codes; aka message integrity code; modification detection code; cryptographic checksum; generated by running message through secret key(DES CBC) MAC is the last block generated by algorithm 64 bit
polyalphabetic
CBC MAC
Blowfish
prime factorization
9. Malled online encryption or traffic flow security- implemented in hardware' encrypts all traffic in a single path
Asymmetric Enc provides
link encryption
FIPS 186
scytale
10. 128 bit digest
link encryption
Digital Signature Standard Algorithms
CRL
MD5
11. Rives Shamir; adleman- based on factoring of large prime numbers-encrypt-dig sig- and key exchange variable key length 512 to 4096- strong but slow; 100 times slower than software; 1000-10000 slower than hardware encryption
cryptanalysis
RSA
ICV
symetric
12. Output feedback; emulates stream cipher; similar to CFB except qty XORed; with each plaintext block; IV used as a seed; then keystream used as IV in continuing process
DES OFB
Hash Function Uses
RiJndael(AES)
collision
13. First public key algorithm; not used for message encrypt or digital signatures; uses large prime numbers; requires both sender and reciever to have key pairs; vulnerable to man in the middle attacks
HAVAL
Diffe Helman
AES
ECC
14. Hardware - software - and policies (security association) -
asymmetric algorithms
Public Key Infrastructure
Stream Cipher
cryptography
15. Authentication and integrity - needed when... At rest and in transit.
PKI
El Gamal
signature
hybrid encrypt features
16. One-way - difficult to solve - uses factorization - private key can compute the public key
DES CFB
Trap Door Function
work factor
Asymmetric Enc provides
17. Advanced Encryption Standard
historical highlights
hybrid encrypt features
running key
RiJndael(AES)
18. Letters represented by numerical place in the alphabet
modular mathematics
RSA
symmetric algorithms types
HAVAL
19. One key - only confidentiality
symetric
zero knowledge proof
3DES
ciphertext
20. Provided by mixing key values during repeated rounds of encryption
non-repudiation
confusion
zero knowledge proof
asymmetric algorithms
21. Similar to RSA - very efficient for low end hardware/limited processing power.
RSA
key space
Elliptical Curve Cryptosystem
crypto services
22. Data in readable format- red side
plaintext
key archival
SHA2
concealment cipher
23. key storage;escrow;archival;recovery agend;multiple key pairs
REED D asym algorithms
Diffe Helman
key mgmt tasks
Knapsack
24. 32 to 448 bit key - Schneier
Symmetric Algorithms
historical highlights
Hash Function Uses
Blowfish
25. Hash Mess Auth Code (512bit MD5; SHA-1); calculated using a hash function with secret key- shared key appended to data shared faster than DES CBC- used in IPSEC SSL/TLS and SSH
HMAC
RiJndael(AES)
Hash Function Uses
key mgmt mechanisms
26. Prove knowledge of a fact to a third party without revealing the fact itself
el gamal
confusion
digital signatures
zero knowledge proof
27. RC(x) - 32 - 64 - 128 bit blocks - key max at 2048 bits
Hash Function Uses
OCSP
Rivest Cipher
substitution cipher
28. Rearranges bits or bytes
transposition cipher
Diffie-Hellman Algorithm
Symmetric Algorithms
key mgmt tasks
29. Secret sequence of bits and instructions used to encrypt/decrypt
symetric synonyms
cryptovariable
certificate practice statement
CAST
30. Monsidered unbreakable- each pad made up of truly random values; used once; securely distributed- protected at sender and reciever sites
asymmetric key encryption
caesar cipher
key escrow
one time pad
31. Looks for patterns in ciphertext to discover the key.
frequency analysis
Knapsack
steganography
brute force attack on hashing
32. Based on Dif Hel; provides encrypt; dig sig; and key exchange; discrete logarithms-easy to reverse engineer; main drawback is performance- slower than other algorithms
key space
Cipher Feedback Mode
el gamal
cryptovariable
33. Single authority trust; heirarchal trust; web of trust; hybrid cross certificationusesd in businesses to trust each others CA's; and DISA Model Root; intermediate; leaf at the local levels
SHA2
cryptology
cryptography
trust model types
34. Modified md5 - v means "variable"
collision
key archival
HAVAL
substitution cipher
35. Instance when two keys keys generate the same ciphertext from same plaintext
symetric synonyms
Common Hash Algorithms
Trap Door Function
key clustering
36. Credentials that allow verification; contains serial no; ident info; dig signature;lifetime dates;public key of the cert holder
key escrow
key space
cert contents
RSA
37. SHA - RSA - Eliptical Curve (ECDSA)
DES ECB
collision
asymmetric algorithms
Digital Signature Standard Algorithms
38. Digital signature standard; performs integrity by SHA; uses DSA; RSA;Elyp CurveDSA
Public Key Infrastructure
concealment cipher
FIPS 186
asymmetric algorithms
39. Storage of keys and certs for extended period of time-normally performed by CA a trusted third party; or key holder
link encryption
key archival
wassenaar arrangement
Common Hash Algorithms
40. Formula is public; used to creat checksums; message digests; or integrity check values
algorithm
hashing algorithm strengths
3DES
SHA2
41. Carlisle Adams and Stafford Tavares; CAST 128 64 bit block cipher-uses keys between 48 and 128 bit lengths 12 to 16 rounds of operations CAST 256 uses 48 rounds; of 128; 192; 160; 224; 256
Rivest Cipher
CAST
transposition cipher
DES CTR
42. Rivest-Shamir-Adleman - factorization - used for encryption - key exchange and digital signature.
recovery agent
RSA
work factor
symetric synonyms
43. Secret; single; conventional; session; shared; private
digital signatures
symetric synonyms
transposition cipher
IDEA
44. MD5 - SHA1
Common Hash Algorithms
concealment cipher
signature
algorithm
45. Measar cipher
key mgmt mechanisms
monoalphabetic
CBC MAC
cryptanalysis
46. Asymmetric enc + Hash - validity of message - non repudiation
Signature
substitution cipher
DES ECB
IDEA
47. 128 bit encryption; on 16 rounds of encryption; key size of 64 bits 8 parity; 56 bits long
cryptology
Lucifer
Elliptical Curve Cryptosystem
hashing algorithm
48. NIST and NSA - 160 bit digest
Digital Signature Standard
Blowfish
vigenere cipher
SHA1
49. Mipher added to plaintext to encrypt
LUC
substitution cipher
cryptology
running key
50. Published document describing: howa CA is structured;which standards are used and how certs are managed
symetric synonyms
signature
concealment cipher
certificate practice statement