Test your basic knowledge |

CISSP Crypto Domain

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Public algorithm - private key.






2. No plaintext exposure; encrypted at source; VPN; SSL ;SSH






3. Based on diffie-hellman - encryption - digital signatures and key exchange.






4. Formula is public; used to creat checksums; message digests; or integrity check values






5. Easily transportable;cannot be initiated by something else; can be automatically time stamped;provides integrity by encrypting hash value;hash value generated with senders private key






6. Set of mathmatical rules used in encryption






7. variable block and key sizes 128; 192; 256; uses a variable number of rounds; has low memory requirements; easy to defend against timing attacks; implemented in software; hardware is costly.






8. RSA; El Gamal; ECC; Diffe Hellman; DSA






9. Polyalphabetic - substitution - 2d grid of alphabet






10. Hardware - software - and policies (security association) -






11. Instance when two keys keys generate the same ciphertext from same plaintext






12. Rivest-Shamir-Adleman - factorization - used for encryption - key exchange and digital signature.






13. Authentication and integrity - needed when... At rest and in transit.






14. Rives Shamir; adleman- based on factoring of large prime numbers-encrypt-dig sig- and key exchange variable key length 512 to 4096- strong but slow; 100 times slower than software; 1000-10000 slower than hardware encryption






15. CIA plus non repudiation






16. Eliptical Curve Cryptography; encryption; dig signatures and key exchange;highest strength per bit of key length; most efficient;160 bit el gamal= 1024 RSA-used in wireless devices use






17. Rearrances the bits characters or character blocks






18. Storage of keys and certs for extended period of time-normally performed by CA a trusted third party; or key holder






19. 32 to 448 bit key - Schneier






20. Spartans - wrapped around rod.






21. Modified md5 - v means "variable"






22. Uses asymmetric to figure out a key - symmetric used for large data encryption.






23. One-way - difficult to solve - uses factorization - private key can compute the public key






24. International Data Encryption Algorithm- operateson 64 bit blocks-uses 128 bit key and is faster than DES; used in PGP and other software; no successful attacks






25. Cannot deny ownership / origination.






26. Mathematical operation performed several times on the same message block






27. RC(x) - 32 - 64 - 128 bit blocks - key max at 2048 bits






28. Estimated time resources to break a cryptosystem






29. Attmpts to conceal data by hiding it; Used by placing information in objectssuch as graphics; sound files or document headers






30. Message Authentication codes; aka message integrity code; modification detection code; cryptographic checksum; generated by running message through secret key(DES CBC) MAC is the last block generated by algorithm 64 bit






31. One key - only confidentiality






32. Letters represented by numerical place in the alphabet






33. Stream based - errors do not propagate across blocks






34. Simple substitution - ROT-n - mono-alphabetical.






35. Published document describing: howa CA is structured;which standards are used and how certs are managed






36. Malled online encryption or traffic flow security- implemented in hardware' encrypts all traffic in a single path






37. Cert Revocation List- identifies Certs that are no longer recognized; maintained and updated periodically; Browsers use OCSP for updates.






38. Large set of possible values used to construct keys






39. 256 or 512-bit digest






40. Science of breakin the code






41. Centralized key mgt key issuer; keeps copy of keys or decentralized key mgt; end user generates keys and submits to CA;does not provide for key escrow; no recovery possible






42. Block based - Previous block seeds next blocks key






43. Pro's: key management cons: speed/file size






44. Looks for patterns in ciphertext to discover the key.






45. Integrity Check Value-makes the hash with the hash algorithm






46. Caesar cipher - scytale - Blaise de vigenere - vernam cipher






47. NIST 1991 - outlines authorized algorithms






48. First public key exchange system - users exchange keys over insecure medium.






49. 1996 - crypto is protected in agreement.






50. First public key algorithm; not used for message encrypt or digital signatures; uses large prime numbers; requires both sender and reciever to have key pairs; vulnerable to man in the middle attacks