Test your basic knowledge |

CISSP Crypto Domain

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Cert Revocation List- identifies Certs that are no longer recognized; maintained and updated periodically; Browsers use OCSP for updates.






2. Online Certificate Status Protocol- used to query the CA; useful in large; complex environments; responds to a query with status of valid; suspended; or revoked






3. Cipher Block Chaining- most common mode of DES loaded sequenctially- XORed using 64 bit initialization vector- first ciphertext XORed with next text block- since IV different;ciphertext different






4. Replaces bits characters and block s with differecnt values






5. Provided by mixing key values during repeated rounds of encryption






6. Prove knowledge of a fact to a third party without revealing the fact itself






7. Secret sequence of bits and instructions used to encrypt/decrypt






8. OCSP; OSPF- routing protocol; Online Vulnerability Assessment Language; Orthogonal Frequency Division Multiplexing

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


9. Similar to RSA - very efficient for low end hardware/limited processing power.






10. Hardware - software - and policies (security association) -






11. Binary operation that adds bits together; plaintext is XORed with a random keystream to generate cyphertext






12. Asymmetric enc + Hash - validity of message - non repudiation






13. A specific proceedure






14. NIST 1991 - outlines authorized algorithms






15. 1996 - crypto is protected in agreement.






16. Message hidden within larger context.






17. First public key algorithm; not used for message encrypt or digital signatures; uses large prime numbers; requires both sender and reciever to have key pairs; vulnerable to man in the middle attacks






18. Hides data in images - usually by LSB (least significant bit)






19. 32 to 448 bit key - Schneier






20. Simple substitution - ROT-n - mono-alphabetical.






21. Operates on bits - higher speed - usually implemented in hardware.






22. Stream cipher; stream algorithm works one bit at a time usually done in Hardware; no memory required; very fast; block cipher; works on blocks of bits; transforms into fixed length blocks; encrypted block by block 64; 128; 256 uses substitution and t






23. Mathematical operation performed several times on the same message block






24. Integrity Check Value-makes the hash with the hash algorithm






25. Instance when two keys keys generate the same ciphertext from same plaintext






26. RSA






27. Data Encryption Standard - 64 bit blocks - 56 bit key - 16 rounds - 4 modes






28. Advanced Encryption Standard - replaced DES - Rijndael based - 128 - 192 - and 256 bit keys/blocks with 10 - 12 - 14 rounds resp.






29. Setting policies; protecting keys; key recovery; responding to key compromise; keys long enough to prevent attack; cryptoperiod: key lifetimes






30. Measar cipher






31. Data Encryption Standard (DES) 5 Block Modes; Trple DES runs through it three times; Blowfish; IDEA; RC4; RC5






32. Digital signature standard; performs integrity by SHA; uses DSA; RSA;Elyp CurveDSA






33. Link Encryption and end to end encryption






34. Centralized key mgt key issuer; keeps copy of keys or decentralized key mgt; end user generates keys and submits to CA;does not provide for key escrow; no recovery possible






35. Single authority trust; heirarchal trust; web of trust; hybrid cross certificationusesd in businesses to trust each others CA's; and DISA Model Root; intermediate; leaf at the local levels






36. Data in readable format- red side






37. SHA - RSA - Eliptical Curve (ECDSA)






38. Each pair of entities must receive in secure fashion; requires more overhead than worth; key distro challenging- sender recievermust be on the same sheet






39. Stream based - also uses prior cypher text to seed






40. One time pad - random key - one use - unbreakable






41. Science of protecting information by encoding it






42. Block based - Previous block seeds next blocks key






43. Set symbol size usually 64 bits






44. Looks for patterns in ciphertext to discover the key.






45. Relies on finding weaknesses in the hashing algorithm






46. Authenticity - integrity - digital signatures - storing passwords.






47. Set of mathmatical rules used in encryption






48. Placementof a secret copy in a secure location






49. Rivest-Shamir-Adleman - factorization - used for encryption - key exchange and digital signature.






50. Cipher Feedback Emulates stream cipher data encrypted in smaller units than block size; plaintext pattersn concealed in XOR; previous ciphertext block is encrypted and output produced is conbined with plaintext block using XOR-to produce next ciphert