Test your basic knowledge |

CISSP Crypto Domain

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Set symbol size usually 64 bits






2. Monsidered unbreakable- each pad made up of truly random values; used once; securely distributed- protected at sender and reciever sites






3. Data in readable format- red side






4. Certificate Authority; registration authority offloads work; validates identity; distributes key; certificate server maintains repository that stores certificates






5. Electronic Code Book Each block encrypted independently; 64 bits at a time; using same key; given message; always same ciphertext; susceptible to plaintext attack






6. Storage of keys and certs for extended period of time-normally performed by CA a trusted third party; or key holder






7. RC(x) - 32 - 64 - 128 bit blocks - key max at 2048 bits






8. Function that takes a variable length string; and compresses and transforms it into a fixed length- output called a hash or message digest






9. Rivest-Shamir-Adleman - factorization - used for encryption - key exchange and digital signature.






10. Based on diffie-hellman - encryption - digital signatures and key exchange.






11. Replaces bits characters and block s with differecnt values






12. Uses asymmetric to figure out a key - symmetric used for large data encryption.






13. Hardware - software - and policies (security association) -






14. Rearrances the bits characters or character blocks






15. Placementof a secret copy in a secure location






16. Estimated time resources to break a cryptosystem






17. Science of protecting information by encoding it






18. Based on probability with 23 people 50% chance 2 will have same birthday






19. Centralized key mgt key issuer; keeps copy of keys or decentralized key mgt; end user generates keys and submits to CA;does not provide for key escrow; no recovery possible






20. Eliptical Curve Cryptography; encryption; dig signatures and key exchange;highest strength per bit of key length; most efficient;160 bit el gamal= 1024 RSA-used in wireless devices use






21. A specific proceedure






22. Hash Mess Auth Code (512bit MD5; SHA-1); calculated using a hash function with secret key- shared key appended to data shared faster than DES CBC- used in IPSEC SSL/TLS and SSH






23. Public algorithm - private key.






24. Provided by mixing key values during repeated rounds of encryption






25. Scrambled version of the alphabet






26. Operates on bits - higher speed - usually implemented in hardware.






27. Rives Shamir; adleman- based on factoring of large prime numbers-encrypt-dig sig- and key exchange variable key length 512 to 4096- strong but slow; 100 times slower than software; 1000-10000 slower than hardware encryption






28. Encrypted data-black side






29. Published document describing: howa CA is structured;which standards are used and how certs are managed






30. Polyalphabetic - substitution - 2d grid of alphabet






31. Looks for patterns in ciphertext to discover the key.






32. Data Encryption Standard (DES) 5 Block Modes; Trple DES runs through it three times; Blowfish; IDEA; RC4; RC5






33. One time pad - random key - one use - unbreakable






34. MD5 - SHA1






35. Asymmetric enc + Hash - validity of message - non repudiation






36. Message Authentication Code - Symmetric enc + Hash






37. International Data Enc Algorithm - 64 bit block - 128 bit key






38. Link Encryption and end to end encryption






39. One key - only confidentiality






40. Upgrade to DES; Replaced by AES; takes three times longer to encrypt






41. SHA - RSA - Eliptical Curve (ECDSA)






42. Rearranges bits or bytes






43. Public Key Infrastructure- Developed to provide standards for key generation; authentication; x.509 non used with Pretty Good Privacy; good private good "web of trust"






44. Each pair of entities must receive in secure fashion; requires more overhead than worth; key distro challenging- sender recievermust be on the same sheet






45. When a hash fuunction generates same output for same input






46. Block based - Previous block seeds next blocks key






47. Used with keys; do not need to be encypted; required to prevent defeat of keyspace through pattern analysis






48. RSA






49. Set of mathmatical rules used in encryption






50. Simple substitution - ROT-n - mono-alphabetical.