Test your basic knowledge |

CISSP Crypto Domain

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Block based - Previous block seeds next blocks key






2. Hides data in images - usually by LSB (least significant bit)






3. Has authority to remove keys from escrow;






4. Based on probability with 23 people 50% chance 2 will have same birthday






5. Authentication and integrity - needed when... At rest and in transit.






6. Rearranges bits or bytes






7. SHA - RSA - Eliptical Curve (ECDSA)






8. Attmpts to conceal data by hiding it; Used by placing information in objectssuch as graphics; sound files or document headers






9. Carlisle Adams and Stafford Tavares; CAST 128 64 bit block cipher-uses keys between 48 and 128 bit lengths 12 to 16 rounds of operations CAST 256 uses 48 rounds; of 128; 192; 160; 224; 256






10. Used with keys; do not need to be encypted; required to prevent defeat of keyspace through pattern analysis






11. Uses Lucas functions.






12. Secret sequence of bits and instructions used to encrypt/decrypt






13. Set of mathmatical rules used in encryption






14. Relies on finding weaknesses in the hashing algorithm






15. Credentials that allow verification; contains serial no; ident info; dig signature;lifetime dates;public key of the cert holder






16. 128 bit encryption; on 16 rounds of encryption; key size of 64 bits 8 parity; 56 bits long






17. characters are substituted or shifted






18. Scrambled version of the alphabet






19. Simple substitution - ROT-n - mono-alphabetical.






20. One time pad - random key - one use - unbreakable






21. 32 to 448 bit key - Schneier






22. Advanced Encryption Standard






23. Each pair of entities must receive in secure fashion; requires more overhead than worth; key distro challenging- sender recievermust be on the same sheet






24. Stream based - also uses prior cypher text to seed






25. Upgrade to DES; Replaced by AES; takes three times longer to encrypt






26. Similar to OFB-insteat of a static IV- a counter is incremented with each data block ;each block XORed with unique keystream value; no chaining; encryption of block s can happen in parallel used in IPSEc and implemented in 802.11i wireless






27. OCSP; OSPF- routing protocol; Online Vulnerability Assessment Language; Orthogonal Frequency Division Multiplexing


28. Storage of keys and certs for extended period of time-normally performed by CA a trusted third party; or key holder






29. Uses asymmetric to figure out a key - symmetric used for large data encryption.






30. Both parties have same key(kept secret) exchage keys before comms begins; faster than asymmetric crypto; best suited for bulk encryption; N(N-1)/2 is the number of keys needed; File Encryption Key (FEK)






31. International Data Encryption Algorithm- operateson 64 bit blocks-uses 128 bit key and is faster than DES; used in PGP and other software; no successful attacks






32. Rivest-Shamir-Adleman - factorization - used for encryption - key exchange and digital signature.






33. Operates on bits - higher speed - usually implemented in hardware.






34. Secret; single; conventional; session; shared; private






35. Monsidered unbreakable- each pad made up of truly random values; used once; securely distributed- protected at sender and reciever sites






36. Spartans - wrapped around rod.






37. Block based - adds padding - same key - same clear = same ciphertext






38. Rives Shamir; adleman- based on factoring of large prime numbers-encrypt-dig sig- and key exchange variable key length 512 to 4096- strong but slow; 100 times slower than software; 1000-10000 slower than hardware encryption






39. Message Authentication Code - Symmetric enc + Hash






40. Prove knowledge of a fact to a third party without revealing the fact itself






41. Provided by mixing up the location of plaintext throughout the cipher






42. Encrypted data-black side






43. 128 bit digest






44. Instance when two keys keys generate the same ciphertext from same plaintext






45. variable block and key sizes 128; 192; 256; uses a variable number of rounds; has low memory requirements; easy to defend against timing attacks; implemented in software; hardware is costly.






46. Hardware - software - and policies (security association) -






47. Function that takes a variable length string; and compresses and transforms it into a fixed length- output called a hash or message digest






48. Keyword: integrity






49. Binary operation that adds bits together; plaintext is XORed with a random keystream to generate cyphertext






50. Data Encryption Standard (DES) 5 Block Modes; Trple DES runs through it three times; Blowfish; IDEA; RC4; RC5