SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Crypto Domain
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Public algorithm - private key.
Rivest Cipher
kerckhoffs principle
cryptology
DES CBC
2. No plaintext exposure; encrypted at source; VPN; SSL ;SSH
cryptography
confusion
link encryption
end to end enccryption
3. Based on diffie-hellman - encryption - digital signatures and key exchange.
plaintext
hashing algorithm strengths
El Gamal
DES
4. Formula is public; used to creat checksums; message digests; or integrity check values
DES ECB
hashing algorithm strengths
message hashing
vernam cipher
5. Easily transportable;cannot be initiated by something else; can be automatically time stamped;provides integrity by encrypting hash value;hash value generated with senders private key
digital signatures
Public Key Infrastructure
cryptovariable
Blowfish
6. Set of mathmatical rules used in encryption
algorithm
Public Key Infrastructure
frequency analysis
Diffe Helman
7. variable block and key sizes 128; 192; 256; uses a variable number of rounds; has low memory requirements; easy to defend against timing attacks; implemented in software; hardware is costly.
AES
DES CBC
PKI
blowfish
8. RSA; El Gamal; ECC; Diffe Hellman; DSA
Cipher Block Chaining
symmetric Crypto
REED D asym algorithms
PKI
9. Polyalphabetic - substitution - 2d grid of alphabet
end to end enccryption
vigenere cipher
Electronic Code Book
SHA2
10. Hardware - software - and policies (security association) -
Public Key Infrastructure
HMAC
plaintext
Cipher Block Chaining
11. Instance when two keys keys generate the same ciphertext from same plaintext
rounds
link encryption
key clustering
steganography
12. Rivest-Shamir-Adleman - factorization - used for encryption - key exchange and digital signature.
el gamal
initialization vector/salt
DES CBC
RSA
13. Authentication and integrity - needed when... At rest and in transit.
RSA
LUC
key mgmgt defined
signature
14. Rives Shamir; adleman- based on factoring of large prime numbers-encrypt-dig sig- and key exchange variable key length 512 to 4096- strong but slow; 100 times slower than software; 1000-10000 slower than hardware encryption
RiJndael(AES)
key mgmgt defined
monoalphabetic
RSA
15. CIA plus non repudiation
DES CBC
diffusion
crypto services
end to end enccryption
16. Eliptical Curve Cryptography; encryption; dig signatures and key exchange;highest strength per bit of key length; most efficient;160 bit el gamal= 1024 RSA-used in wireless devices use
Diffe Helman
Cipher Feedback Mode
ECC
SHA2
17. Rearrances the bits characters or character blocks
symetric
transposition/permutation cipher
rounds
Asymmetric uses
18. Storage of keys and certs for extended period of time-normally performed by CA a trusted third party; or key holder
substitution cipher
key archival
Elliptical Curve Cryptosystem
symetric
19. 32 to 448 bit key - Schneier
key clustering
Blowfish
key mgmt tasks
Asymmetric Enc provides
20. Spartans - wrapped around rod.
scytale
certificate practice statement
key space
hybrid encrypt features
21. Modified md5 - v means "variable"
end to end enccryption
HAVAL
SHA2
collision
22. Uses asymmetric to figure out a key - symmetric used for large data encryption.
Hybrid Encryption
Blowfish
data transmission
RSA
23. One-way - difficult to solve - uses factorization - private key can compute the public key
Trap Door Function
Signature
Asymmetric Enc provides
steganography
24. International Data Encryption Algorithm- operateson 64 bit blocks-uses 128 bit key and is faster than DES; used in PGP and other software; no successful attacks
Common Hash Algorithms
DES OFB
cryptanalysis
IDEA
25. Cannot deny ownership / origination.
non-repudiation
symetric
REED D asym algorithms
collision
26. Mathematical operation performed several times on the same message block
rounds
DES CTR
DES CFB
ONE time pad problems
27. RC(x) - 32 - 64 - 128 bit blocks - key max at 2048 bits
DES CFB
symmetric algorithms types
Hybrid Encryption
Rivest Cipher
28. Estimated time resources to break a cryptosystem
initialization vector/salt
Diffie-Hellman Algorithm
CRL
work factor
29. Attmpts to conceal data by hiding it; Used by placing information in objectssuch as graphics; sound files or document headers
cryptology
steganography
wassenaar arrangement
CBC MAC
30. Message Authentication codes; aka message integrity code; modification detection code; cryptographic checksum; generated by running message through secret key(DES CBC) MAC is the last block generated by algorithm 64 bit
key mgmt tasks
algorithm
CBC MAC
3DES
31. One key - only confidentiality
symetric
asymmetric key encryption
plaintext
algorithm
32. Letters represented by numerical place in the alphabet
modular mathematics
Signature
one time pad
substitution cipher
33. Stream based - errors do not propagate across blocks
symmetric Crypto
Electronic Code Book
Key zeroization
Output Feedback Mode
34. Simple substitution - ROT-n - mono-alphabetical.
caesar cipher
polyalphabetic
ECC
modular mathematics
35. Published document describing: howa CA is structured;which standards are used and how certs are managed
Digital Signature Standard Algorithms
cert contents
certificate practice statement
ECC
36. Malled online encryption or traffic flow security- implemented in hardware' encrypts all traffic in a single path
hybrid encrypt features
link encryption
initialization vector/salt
El Gamal
37. Cert Revocation List- identifies Certs that are no longer recognized; maintained and updated periodically; Browsers use OCSP for updates.
ciphertext
PKI
OCSP
CRL
38. Large set of possible values used to construct keys
key space
Trap Door Function
HMAC
Blowfish
39. 256 or 512-bit digest
one time pad
CBC MAC
SHA2
Rivest Cipher
40. Science of breakin the code
cryptanalysis
birthday paradox
RiJndael(AES)
Digital Signature Standard Algorithms
41. Centralized key mgt key issuer; keeps copy of keys or decentralized key mgt; end user generates keys and submits to CA;does not provide for key escrow; no recovery possible
Stream Cipher
DES CFB
key mgmt mechanisms
signature
42. Block based - Previous block seeds next blocks key
el gamal
Cipher Block Chaining
cert contents
certificate practice statement
43. Pro's: key management cons: speed/file size
ciphertext
frequency analysis
asymmetric key encryption
symetric synonyms
44. Looks for patterns in ciphertext to discover the key.
diffusion
caesar cipher
asymmetric algorithms
frequency analysis
45. Integrity Check Value-makes the hash with the hash algorithm
IDEA
ICV
DES CFB
Asymmetric Enc provides
46. Caesar cipher - scytale - Blaise de vigenere - vernam cipher
Key zeroization
monoalphabetic
signature
historical highlights
47. NIST 1991 - outlines authorized algorithms
symetric synonyms
Digital Signature Standard
scytale
key clustering
48. First public key exchange system - users exchange keys over insecure medium.
Diffie-Hellman Algorithm
ONE time pad problems
hashing algorithm
Diffe Helman
49. 1996 - crypto is protected in agreement.
Asymmetric Enc provides
wassenaar arrangement
el gamal
substitution cipher
50. First public key algorithm; not used for message encrypt or digital signatures; uses large prime numbers; requires both sender and reciever to have key pairs; vulnerable to man in the middle attacks
Diffe Helman
DES CTR
3DES
ECC