SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Crypto Domain
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Uses Lucas functions.
Lucifer
LUC
ECC
3DES
2. One time pad - random key - one use - unbreakable
el gamal
Asymmetric uses
vernam cipher
key mgmt mechanisms
3. Advanced Encryption Standard - replaced DES - Rijndael based - 128 - 192 - and 256 bit keys/blocks with 10 - 12 - 14 rounds resp.
AES
asymmetric algorithms
Trap Door Function
running key
4. Hides data in images - usually by LSB (least significant bit)
steganography
RSA
historical highlights
cryptanalysis
5. Authenticity - integrity - digital signatures - storing passwords.
CAST
Hash Function Uses
algorithm
Output Feedback Mode
6. Authentication and integrity - needed when... At rest and in transit.
certificate practice statement
key clustering
signature
vernam cipher
7. key storage;escrow;archival;recovery agend;multiple key pairs
key mgmt tasks
ciphertext
non-repudiation
HAVAL
8. Broken
Knapsack
ICV
IDEA
Electronic Code Book
9. Rives Shamir; adleman- based on factoring of large prime numbers-encrypt-dig sig- and key exchange variable key length 512 to 4096- strong but slow; 100 times slower than software; 1000-10000 slower than hardware encryption
key escrow
cryptovariable
RSA
Signature
10. Formula is public; used to creat checksums; message digests; or integrity check values
cert contents
SHA2
hashing algorithm strengths
initialization vector/salt
11. 64 bit blocks of data; variable key lengths
CA
Cipher Feedback Mode
blowfish
Hybrid Encryption
12. Public algorithm - private key.
collision
RiJndael(AES)
hybrid encrypt features
kerckhoffs principle
13. Operates on bits - higher speed - usually implemented in hardware.
birthday paradox
Stream Cipher
wassenaar arrangement
data transmission
14. Measar cipher
Common Hash Algorithms
monoalphabetic
initialization vector/salt
substitution cipher
15. Centralized key mgt key issuer; keeps copy of keys or decentralized key mgt; end user generates keys and submits to CA;does not provide for key escrow; no recovery possible
key clustering
Cipher Feedback Mode
SHA2
key mgmt mechanisms
16. Based on probability with 23 people 50% chance 2 will have same birthday
birthday paradox
HAVAL
prime factorization
IDEA
17. One key - only confidentiality
Exclusive Or(XOR)
IDEA
birthday paradox
symetric
18. Hardware - software - and policies (security association) -
Public Key Infrastructure
Diffe Helman
Cipher Block Chaining
Knapsack
19. DES - 3des - aes - idea - two fish - rc4 - blow fish
signature
asymmetric algorithms
Symmetric Algorithms
transposition cipher
20. MD5 - SHA1
CRL
ciphertext
Common Hash Algorithms
DES CBC
21. 256 or 512-bit digest
asymmetric algorithms
SHA2
RSA
transposition/permutation cipher
22. First public key algorithm; not used for message encrypt or digital signatures; uses large prime numbers; requires both sender and reciever to have key pairs; vulnerable to man in the middle attacks
PKI
Hybrid Encryption
link encryption
Diffe Helman
23. Letters represented by numerical place in the alphabet
CAST
DES CBC
modular mathematics
confusion
24. Encrypted data-black side
ciphertext
HMAC
hybrid encrypt features
symmetric Crypto
25. First public key exchange system - users exchange keys over insecure medium.
symmetric algorithms types
steganography
Trap Door Function
Diffie-Hellman Algorithm
26. Function that takes a variable length string; and compresses and transforms it into a fixed length- output called a hash or message digest
certificate practice statement
key archival
Rivest Cipher
hashing algorithm
27. Pro's: key management cons: speed/file size
collision
symmetric algorithms types
asymmetric algorithms
asymmetric key encryption
28. Instance when two keys keys generate the same ciphertext from same plaintext
key mgmt mechanisms
historical highlights
Key zeroization
key clustering
29. Uses asymmetric to figure out a key - symmetric used for large data encryption.
Hybrid Encryption
vigenere cipher
asymmetric algorithms
symmetric algorithms types
30. Storage of keys and certs for extended period of time-normally performed by CA a trusted third party; or key holder
link encryption
DES ECB
key archival
hybrid encrypt features
31. Symmetric for Bulk Encrypt; assym for key encapsulation- used in SSL; Email; key exchange
monoalphabetic
hybrid encrypt features
Common Hash Algorithms
Hash Function Uses
32. Rearranges bits or bytes
3DES
Stream Cipher
modular mathematics
transposition cipher
33. When a hash fuunction generates same output for same input
polyalphabetic
collision
Elliptical Curve Cryptosystem
ONE time pad problems
34. Similar to RSA - very efficient for low end hardware/limited processing power.
AES
DES CTR
Elliptical Curve Cryptosystem
cryptography
35. Large set of possible values used to construct keys
key space
Diffe Helman
Exclusive Or(XOR)
collision
36. Data in readable format- red side
substitution cipher
hashing algorithm
symmetric algorithms types
plaintext
37. Block based - Previous block seeds next blocks key
DES CTR
initialization vector/salt
transposition cipher
Cipher Block Chaining
38. Electronic Code Book Each block encrypted independently; 64 bits at a time; using same key; given message; always same ciphertext; susceptible to plaintext attack
DES
steganography
SHA1
DES ECB
39. No plaintext exposure; encrypted at source; VPN; SSL ;SSH
Symmetric Algorithms
collision
end to end enccryption
CBC MAC
40. RSA; El Gamal; ECC; Diffe Hellman; DSA
Rivest Cipher
REED D asym algorithms
cert contents
transposition cipher
41. Message hidden within larger context.
Exclusive Or(XOR)
vigenere cipher
concealment cipher
CA
42. Single authority trust; heirarchal trust; web of trust; hybrid cross certificationusesd in businesses to trust each others CA's; and DISA Model Root; intermediate; leaf at the local levels
trust model types
Hybrid Encryption
recovery agent
initialization vector/salt
43. Certificate Authority; registration authority offloads work; validates identity; distributes key; certificate server maintains repository that stores certificates
vernam cipher
asymmetric key encryption
CA
DES CBC
44. Science of breakin the code
cryptanalysis
DES CTR
ICV
asymmetric key encryption
45. Simple substitution - ROT-n - mono-alphabetical.
3DES
Electronic Code Book
caesar cipher
SHA2
46. Public Key Infrastructure- Developed to provide standards for key generation; authentication; x.509 non used with Pretty Good Privacy; good private good "web of trust"
historical highlights
3DES
PKI
key archival
47. Data Encryption Standard - 64 bit blocks - 56 bit key - 16 rounds - 4 modes
crypto services
symmetric algorithms types
DES
cryptanalysis
48. Binary operation that adds bits together; plaintext is XORed with a random keystream to generate cyphertext
DES
Exclusive Or(XOR)
IDEA
RiJndael(AES)
49. 32 to 448 bit key - Schneier
Blowfish
birthday paradox
el gamal
LUC
50. Integrity Check Value-makes the hash with the hash algorithm
ICV
modular mathematics
cryptography
polyalphabetic