SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Crypto Domain
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Message Authentication codes; aka message integrity code; modification detection code; cryptographic checksum; generated by running message through secret key(DES CBC) MAC is the last block generated by algorithm 64 bit
CBC MAC
RiJndael(AES)
work factor
ONE time pad problems
2. Scrambled version of the alphabet
Asymmetric uses
polyalphabetic
key space
RSA
3. Advanced Encryption Standard
RiJndael(AES)
work factor
substitution cipher
FIPS 186
4. Authenticity - integrity - digital signatures - storing passwords.
Hash Function Uses
concealment cipher
scytale
Hash
5. Replaces bits characters and block s with differecnt values
PKI
asymmetric key encryption
cryptanalysis
substitution cipher
6. Provided by mixing key values during repeated rounds of encryption
cryptovariable
birthday paradox
Rivest Cipher
confusion
7. Upgrade to DES; Replaced by AES; takes three times longer to encrypt
vigenere cipher
Electronic Code Book
IDEA
3DES
8. CIA plus non repudiation
crypto services
Block Cipher
DES CFB
algorithm
9. Provided by mixing up the location of plaintext throughout the cipher
diffusion
Rivest Cipher
symetric
IDEA
10. Online Certificate Status Protocol- used to query the CA; useful in large; complex environments; responds to a query with status of valid; suspended; or revoked
substitution cipher
Lucifer
initialization vector/salt
OCSP
11. Secret sequence of bits and instructions used to encrypt/decrypt
Common Hash Algorithms
ONE time pad problems
cryptovariable
cryptography
12. Certificate Authority; registration authority offloads work; validates identity; distributes key; certificate server maintains repository that stores certificates
key escrow
crypto services
CA
IDEA
13. Has authority to remove keys from escrow;
caesar cipher
concealment cipher
recovery agent
Key zeroization
14. Used with keys; do not need to be encypted; required to prevent defeat of keyspace through pattern analysis
Exclusive Or(XOR)
initialization vector/salt
cryptology
Signature
15. Encrypted data-black side
ECC
RiJndael(AES)
DES CBC
ciphertext
16. Rives Shamir; adleman- based on factoring of large prime numbers-encrypt-dig sig- and key exchange variable key length 512 to 4096- strong but slow; 100 times slower than software; 1000-10000 slower than hardware encryption
steganography
key space
RSA
wassenaar arrangement
17. Prove knowledge of a fact to a third party without revealing the fact itself
Hybrid Encryption
zero knowledge proof
work factor
substitution cipher
18. Rivest-Shamir-Adleman - factorization - used for encryption - key exchange and digital signature.
key storage
Blowfish
HMAC
RSA
19. Hides data in images - usually by LSB (least significant bit)
Rivest Cipher
steganography
HAVAL
Lucifer
20. RSA; El Gamal; ECC; Diffe Hellman; DSA
substitution cipher
MD5
key clustering
REED D asym algorithms
21. Message Authentication Code - Symmetric enc + Hash
HMAC
scytale
Output Feedback Mode
Diffie-Hellman Algorithm
22. Data Encryption Standard - 64 bit blocks - 56 bit key - 16 rounds - 4 modes
steganography
certificate practice statement
DES
confusion
23. First public key algorithm; not used for message encrypt or digital signatures; uses large prime numbers; requires both sender and reciever to have key pairs; vulnerable to man in the middle attacks
substitution cipher
Diffe Helman
AES
SHA2
24. Storage of keys and certs for extended period of time-normally performed by CA a trusted third party; or key holder
key archival
historical highlights
Hash
asymmetric algorithms
25. Formula is public; used to creat checksums; message digests; or integrity check values
key clustering
hashing algorithm strengths
ciphertext
Digital Signature Standard
26. Rearrances the bits characters or character blocks
end to end enccryption
key storage
transposition/permutation cipher
symmetric Crypto
27. Buries a message by taking the least significant bit of evvery byte to carry the message; hide a message in another message. Graphics; sound files; alternated used in corporate espionage
algorithm
El Gamal
Common Hash Algorithms
steganography
28. Block based - adds padding - same key - same clear = same ciphertext
initialization vector/salt
scytale
Electronic Code Book
vernam cipher
29. Credentials that allow verification; contains serial no; ident info; dig signature;lifetime dates;public key of the cert holder
work factor
algorithm
cert contents
Lucifer
30. 128 bit encryption; on 16 rounds of encryption; key size of 64 bits 8 parity; 56 bits long
CRL
Lucifer
ICV
DES
31. NIST and NSA - 160 bit digest
SHA1
symetric
AES
prime factorization
32. Confidentiality - Authentication - Non-Repudiation
link encryption
Asymmetric Enc provides
symmetric algorithms types
RSA
33. Integrity Check Value-makes the hash with the hash algorithm
cryptanalysis
Digital Signature Standard Algorithms
ICV
LUC
34. Measar cipher
monoalphabetic
Diffe Helman
steganography
key archival
35. Binary operation that adds bits together; plaintext is XORed with a random keystream to generate cyphertext
LUC
Output Feedback Mode
Exclusive Or(XOR)
crypto services
36. Based on probability with 23 people 50% chance 2 will have same birthday
hashing algorithm strengths
birthday paradox
hybrid encrypt features
Diffie-Hellman Algorithm
37. No plaintext exposure; encrypted at source; VPN; SSL ;SSH
transposition/permutation cipher
end to end enccryption
frequency analysis
SHA2
38. Hash Mess Auth Code (512bit MD5; SHA-1); calculated using a hash function with secret key- shared key appended to data shared faster than DES CBC- used in IPSEC SSL/TLS and SSH
brute force attack on hashing
Knapsack
HMAC
crypto services
39. Set symbol size usually 64 bits
transposition cipher
Block Cipher
link encryption
AES
40. Based on diffie-hellman - encryption - digital signatures and key exchange.
MD5
Trap Door Function
Digital Signature Standard
El Gamal
41. Malled online encryption or traffic flow security- implemented in hardware' encrypts all traffic in a single path
initialization vector/salt
AES
running key
link encryption
42. Carlisle Adams and Stafford Tavares; CAST 128 64 bit block cipher-uses keys between 48 and 128 bit lengths 12 to 16 rounds of operations CAST 256 uses 48 rounds; of 128; 192; 160; 224; 256
cryptography
Diffe Helman
CAST
RSA
43. Pro's: key management cons: speed/file size
steganography
asymmetric key encryption
non-repudiation
Hash Function Uses
44. Simple substitution - ROT-n - mono-alphabetical.
4 O's
SHA1
blowfish
caesar cipher
45. Data Encryption Standard (DES) 5 Block Modes; Trple DES runs through it three times; Blowfish; IDEA; RC4; RC5
RiJndael(AES)
Trap Door Function
key storage
symmetric algorithms types
46. Both parties have same key(kept secret) exchage keys before comms begins; faster than asymmetric crypto; best suited for bulk encryption; N(N-1)/2 is the number of keys needed; File Encryption Key (FEK)
IDEA
modular mathematics
symmetric Crypto
CBC MAC
47. NIST 1991 - outlines authorized algorithms
prime factorization
Digital Signature Standard
Cipher Feedback Mode
initialization vector/salt
48. A specific proceedure
ICV
IDEA
algorithm
cryptanalysis
49. 256 or 512-bit digest
CAST
Cipher Feedback Mode
SHA2
Diffie-Hellman Algorithm
50. key storage;escrow;archival;recovery agend;multiple key pairs
key mgmt tasks
SHA1
OCSP
steganography