SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
CISSP Crypto Domain
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 32 to 448 bit key - Schneier
Hash Function Uses
ICV
algorithm
Blowfish
2. Stream based - also uses prior cypher text to seed
message hashing
Cipher Feedback Mode
cert contents
Digital Signature Standard Algorithms
3. Estimated time resources to break a cryptosystem
data transmission
RSA
work factor
Rivest Cipher
4. Malled online encryption or traffic flow security- implemented in hardware' encrypts all traffic in a single path
Knapsack
link encryption
transposition/permutation cipher
cryptology
5. Published document describing: howa CA is structured;which standards are used and how certs are managed
certificate practice statement
Output Feedback Mode
ciphertext
IDEA
6. Secret; single; conventional; session; shared; private
symetric synonyms
concealment cipher
Key zeroization
Hash Function Uses
7. Confidentiality - Authentication - Non-Repudiation
symmetric Crypto
Asymmetric Enc provides
cryptology
key storage
8. Rearrances the bits characters or character blocks
DES CFB
SHA2
Key zeroization
transposition/permutation cipher
9. Science of breakin the code
cryptanalysis
vigenere cipher
FIPS 186
monoalphabetic
10. RC(x) - 32 - 64 - 128 bit blocks - key max at 2048 bits
rounds
Digital Signature Standard Algorithms
polyalphabetic
Rivest Cipher
11. Encrypted data-black side
Output Feedback Mode
confusion
HMAC
ciphertext
12. characters are substituted or shifted
HMAC
birthday paradox
CBC MAC
substitution cipher
13. Monsidered unbreakable- each pad made up of truly random values; used once; securely distributed- protected at sender and reciever sites
one time pad
hybrid encrypt features
Cipher Feedback Mode
HAVAL
14. First public key algorithm; not used for message encrypt or digital signatures; uses large prime numbers; requires both sender and reciever to have key pairs; vulnerable to man in the middle attacks
ECC
PKI
Diffe Helman
cryptanalysis
15. Block based - adds padding - same key - same clear = same ciphertext
Electronic Code Book
crypto services
hybrid encrypt features
AES
16. Different keys for encryption and decryption; two keys private and public Encrypt with private- unencrypt with privateor encrypt with public- decrypt with private. Use of private ensures non repudiation; without confidentiality-becomes the digital si
ONE time pad problems
DES OFB
cryptanalysis
asymmetric algorithms
17. Formula is public; used to creat checksums; message digests; or integrity check values
hashing algorithm strengths
symmetric algorithms types
REED D asym algorithms
birthday paradox
18. Public algorithm - private key.
ONE time pad problems
FIPS 186
kerckhoffs principle
RiJndael(AES)
19. Certificate Authority; registration authority offloads work; validates identity; distributes key; certificate server maintains repository that stores certificates
key mgmt tasks
scytale
CAST
CA
20. Simple substitution - ROT-n - mono-alphabetical.
IDEA
end to end enccryption
Public Key Infrastructure
caesar cipher
21. No plaintext exposure; encrypted at source; VPN; SSL ;SSH
signature
scytale
end to end enccryption
Electronic Code Book
22. Provided by mixing key values during repeated rounds of encryption
Exclusive Or(XOR)
confusion
AES
key storage
23. Prevent disclosure - privacy
Symmetric Algorithms
zero knowledge proof
CAST
cryptography
24. Scrambled version of the alphabet
polyalphabetic
Digital Signature Standard
SHA1
hashing algorithm
25. variable block and key sizes 128; 192; 256; uses a variable number of rounds; has low memory requirements; easy to defend against timing attacks; implemented in software; hardware is costly.
Diffe Helman
Symmetric Algorithms
zero knowledge proof
AES
26. Single authority trust; heirarchal trust; web of trust; hybrid cross certificationusesd in businesses to trust each others CA's; and DISA Model Root; intermediate; leaf at the local levels
Block Cipher
trust model types
certificate practice statement
Electronic Code Book
27. International Data Encryption Algorithm- operateson 64 bit blocks-uses 128 bit key and is faster than DES; used in PGP and other software; no successful attacks
IDEA
plaintext
key archival
Electronic Code Book
28. Message hidden within larger context.
concealment cipher
link encryption
crypto services
message hashing
29. Encryption - decryption - signing - verifying
Asymmetric uses
initialization vector/salt
Blowfish
SHA1
30. Spartans - wrapped around rod.
Output Feedback Mode
scytale
ECC
frequency analysis
31. Online Certificate Status Protocol- used to query the CA; useful in large; complex environments; responds to a query with status of valid; suspended; or revoked
Trap Door Function
non-repudiation
OCSP
RiJndael(AES)
32. Output feedback; emulates stream cipher; similar to CFB except qty XORed; with each plaintext block; IV used as a seed; then keystream used as IV in continuing process
vigenere cipher
HMAC
DES OFB
Common Hash Algorithms
33. Secret sequence of bits and instructions used to encrypt/decrypt
cryptovariable
Hybrid Encryption
Asymmetric uses
Cipher Block Chaining
34. Upgrade to DES; Replaced by AES; takes three times longer to encrypt
Diffe Helman
steganography
rounds
3DES
35. Placementof a secret copy in a secure location
AES
key storage
CRL
DES ECB
36. Keys needed to decrypt cyphertext so an authorized third party can gain access
Asymmetric uses
key escrow
caesar cipher
end to end enccryption
37. key storage;escrow;archival;recovery agend;multiple key pairs
Asymmetric Enc provides
IDEA
key mgmt tasks
CA
38. Replaces bits characters and block s with differecnt values
key space
substitution cipher
Output Feedback Mode
CBC MAC
39. 64 bit blocks of data; variable key lengths
Diffie-Hellman Algorithm
birthday paradox
DES OFB
blowfish
40. Hides data in images - usually by LSB (least significant bit)
steganography
cert contents
Electronic Code Book
Digital Signature Standard
41. SHA - RSA - Eliptical Curve (ECDSA)
3DES
Digital Signature Standard Algorithms
asymmetric algorithms
Cipher Block Chaining
42. Based on diffie-hellman - encryption - digital signatures and key exchange.
kerckhoffs principle
Diffe Helman
Lucifer
El Gamal
43. Mathematical operation performed several times on the same message block
key mgmgt defined
IDEA
diffusion
rounds
44. Large set of possible values used to construct keys
brute force attack on hashing
key space
historical highlights
Cipher Block Chaining
45. Digital signature standard; performs integrity by SHA; uses DSA; RSA;Elyp CurveDSA
Rivest Cipher
AES
FIPS 186
asymmetric algorithms
46. Integrity Check Value-makes the hash with the hash algorithm
Diffe Helman
ICV
AES
historical highlights
47. DES - 3des - aes - idea - two fish - rc4 - blow fish
Symmetric Algorithms
IDEA
cryptovariable
SHA1
48. Provided by mixing up the location of plaintext throughout the cipher
key space
diffusion
end to end enccryption
crypto services
49. Keyword: integrity
Hash
end to end enccryption
cryptography
Stream Cipher
50. First public key exchange system - users exchange keys over insecure medium.
key storage
Diffie-Hellman Algorithm
DES
symetric synonyms