SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cryptography
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Provides integrity - authentication - and non-repudiation by encrypting a message digest with a private key
digital signature
elliptic curve
DSS
four modes of DES
2. Method of encryption and decryption
cipher
SHA-2
lanman
cryptanalysis
3. PGP and SSH
WPA2
symmetric key
hybrid
hybrid cryptosystem
4. Most widely used tunneling protocol - over port 1723 - data carried in an IP tunnel over Generic Routing Encapsulation (GRE)
integrity
symmetric key algorithms
PPTP
cryptography
5. For encrypting web communications - uses Cryptographic Messaging Syntax (CMS) to protect individual message and response
symmetric ciphers
S-HTTP
elliptic curve
symmetric key
6. Developed to strengthen DES - uses 3 keys (key clustering) to encrypt 3 times
triple DES
S-HTTP
integrity
hybrid cryptosystem
7. Symmetric cryptography - asymmetric cryptography - and hashes provide __________
symmetric ciphers
secure hash algorithms
TLS
confidentiality
8. Tunneling protocol originally used on UNIX - uses port 22 - typically used for remote administration - replaces telnet and FTP
X.509
symmetric key
SSH
hashing
9. A secure cryptoprocessor embedded in the motherboard used to authenticate a hardware device - TPM stands for
IPSec
NTLM
MIME
trusted platform module
10. PKI standard
unclassified data
X.509
TKIP
symmetric key algorithms
11. Most widely used asymmetric algorithm - used for digital signatures - key exchange - and encryption
WPA2
HTTPS
X.509
RSA
12. Block and stream
symmetric ciphers
digital signature
symmetric key
digital signature
13. PPTP - L2TP - IPSec - and SSH
asymmetric key
cipher
wired equivalency privacy
tunneling protocols
14. Password storage hash for Windows systems after XP - uses MD4 and full unicode character set
NTLM
triple DES
transport layer security
symmetric key algorithms
15. Tunneling protocol that merges PPTP with L2F - using port 1701 - is used over UDP - can be combined with IPSec for 5 layered encapsulation
integrity
SHA-2
L2TP
Hash Message Authentication Code
16. Cipher block chaining (CBC) - cipher feedback (CFB) - electronic code book (ECB) and output feedback (OFB)
SHA
hashing
WPA2
four modes of DES
17. A cryptographic communications protocol at the transport layer that provides public key encryption (RSA or Diffie-Helman) - data encryption (IDEA - DES - 3DES) - server authentication - message integrity (MD5 or SHA-1) - and client authentication.
stream cipher
S/MIME
SSL
Hash Message Authentication Code
18. Technique of encapsulating one packet of data within another type to create a secure link of transportation
steganography
tunneling
SSH
MD5
19. Cryptographic algorithm that operates on plaintext - one bit at a time - and enciphers with a random generated "key stream" using substitution
Message Authentication Code
PG
key
stream cipher
20. Sequence of bits used in encryption and decryption - also known as cryptovariable
SSH
AES
TKIP
key
21. Encryption standard broken in 1998 - has a relatively short key length
L2TP
collision
DES
confidentiality
22. SHA-1 - MD2/ MD4 - MD5 - Fasthash - Triple DES-MAC - Tiger - and RIPEMD-160
digital signature
symmetric key
one time pad
secure hash algorithms
23. Process of transforming ciphertext into plaintext (decipherment)
decryption
non repudiation
symmetric key
hybrid
24. Runs on top of TLS on port 443 - protected against MITM attacks and creates secure connections
AES
elliptic curve
HTTPS
symmetric key
25. Enciphers fixed-size blocks of bits using substitution and permutation
plaintext
block cipher
NTLM
hashing
26. Based on use of one private/secret key - does NOT provide authentication or nonrepudiation - uses MAC
symmetric ciphers
symmetric key
DES
WPA2
27. Based on two keys - public and private - one-way function: a key cannot decrypt what it encrypts - provides confidentiality - authentication - integrity - and nonrepudiation - Discovered by Diffie and Hellman - also known as public key
symmetric ciphers
SHA
asymmetric key
S-HTTP
28. Data encryption standard derived from IBM Lucifer algorithm - 56-bit key - 64-bit block - uses the Data Encryption Algorithm (DEA)
S-HTTP
DES
SHA
lanman
29. Allow client/server applcation to communicate in a secure manner across a network - TLS stands for
unclassified data
integrity
PPTP
transport layer security
30. Encrypting all data on a disk using common algorithms (AES) - requires a key (passpharse - USB key) in memory to decrypt disk
WPA2
whole disk encryption
key
tunneling protocols
31. RSA - Diffie and Hellman - Elliptic Curve (EC) - DSS (Digital Signature Standard) - El Gamal - Merkel-Hellman
RSA
plaintext
block cipher
asymmetric key algorithms
32. Protects against removing or installing a bogus hard drive using sealing (measuring system variables - BIOS - boot sector - firmware)
whole disk encryption
digital signature
TPM
MD5
33. Discovering the original message using other than normal means (i.e. "breaking" the cryptosystem)
cryptanalysis
triple DES
WPA2
DSS
34. An algorithm developed to secure wireless - improperly implemented RC4 - only had a 40 bit key
Message Authentication Code
plaintext
wired equivalency privacy
one time pad
35. A cryptographic protocol that provides security for communications over networks such as the Internet - more secure that SSL
IPSec
NTLM
X.509
TLS
36. Encrypted text - also called cryptogram
ciphertext
SSL
DES
DES
37. Password storage hash for Windows XP - separates password into two 7 character parts and converts to upper case
TPM
symmetric key
lanman
steganography
38. Sender/receiver share the same key - fast - provides confidentiality - key management issue
PPTP
integrity
symmetric key
ciphertext
39. Process of transforming plaintext into unreadable format
symmetric ciphers
encryption
unclassified data
digital signature
40. Asymmetric cryptography - hashes - and digital signatures provide __________
X.509
PPTP
non repudiation
whole disk encryption
41. Used by WPA - uses RC4 with IV - blocks replay attacks with packet sequence counter - replaced by WPA2
SSH
TKIP
secure hash algorithms
L2TP
42. Digital signature standard that uses 2 algorithms: RSA and DSA (based on El Gamal) - both use the Secure Hash Standard (SHA-1)
IPSec
DSS
unclassified data
integrity
43. Encrypting a message's hash value with a private key - DOES NOT ensure confidentiality
digital signature
lanman
hybrid
PG
44. An internet email standard format specifying how multimedia and attachments are handled
MIME
AES
block cipher
confidentiality
45. An algorithm developed to secure wireless that uses AES (CCMP + AES)
X.509
digital signature
SSL
WPA2
46. Free email security program that uses several algorithms - symmetric (IDEA) - asymmetric (RSA) and hashes (SHA1) and the web of trust
encryption
PPTP
PG
lanman
47. Common tunneling protocol integrated in Windows - works well with NAT - maybe blocked at firewall
key
plaintext
PPTP
tunneling protocols
48. Selected by NIST for cryptographic hash functions for public use - 160 bit length
cryptanalysis
SHA
HTTPS
asymmetric key algorithms
49. Provides digests in different lengths including 224 - 256 - 384 - and 512
NTLM
SHA-2
TKIP
wired equivalency privacy
50. AES Encryption standard used to protect sensitive but ________ - default key 128
PPTP
Hash Message Authentication Code
RSA
unclassified data
Link to This Test
Related Subjects
Soft Skills
Business Skills