SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cryptography
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A protocol suite for securing network connections using IKE - AH - and ESP
IPSec
SHA-2
hashing
L2TP
2. An internet email standard format specifying how multimedia and attachments are handled
stream cipher
symmetric key
MIME
Hash Message Authentication Code
3. Sender/receiver share the same key - fast - provides confidentiality - key management issue
TLS
four modes of DES
elliptic curve
symmetric key
4. Common tunneling protocol integrated in Windows - works well with NAT - maybe blocked at firewall
IPSec
X.509
PPTP
TPM
5. AES Encryption standard used to protect sensitive but ________ - default key 128
NTLM
SSL
unclassified data
DES
6. Encrypting a message's hash value with a private key - DOES NOT ensure confidentiality
symmetric ciphers
DSS
unclassified data
digital signature
7. Art of hiding communications - i.e. hide information in graphic files - sound files - or slack space.
symmetric ciphers
steganography
RSA
asymmetric key
8. A cryptographic communications protocol at the transport layer that provides public key encryption (RSA or Diffie-Helman) - data encryption (IDEA - DES - 3DES) - server authentication - message integrity (MD5 or SHA-1) - and client authentication.
IPSec
digital signature
SSL
asymmetric key algorithms
9. An algorithm developed to secure wireless that uses AES (CCMP + AES)
digital signature
lanman
DES
WPA2
10. PKI standard
unclassified data
integrity
trusted platform module
X.509
11. Block and stream
wired equivalency privacy
DSS
TPM
symmetric ciphers
12. Tunneling protocol originally used on UNIX - uses port 22 - typically used for remote administration - replaces telnet and FTP
symmetric key algorithms
IPSec
symmetric ciphers
SSH
13. Symmetric cryptography - asymmetric cryptography - and hashes provide __________
hybrid
decryption
triple DES
confidentiality
14. PPTP - L2TP - IPSec - and SSH
tunneling protocols
SHA
SSL
S/MIME
15. Provides integrity - authentication - and non-repudiation by encrypting a message digest with a private key
digital signature
SHA
asymmetric key
cryptography
16. Used by WPA - uses RC4 with IV - blocks replay attacks with packet sequence counter - replaced by WPA2
symmetric key
whole disk encryption
TLS
TKIP
17. Cipher block chaining (CBC) - cipher feedback (CFB) - electronic code book (ECB) and output feedback (OFB)
four modes of DES
WPA2
ciphertext
DSS
18. Developed to replace DES based on Rijndael variable block cipher - has a fixed block length and key lengths: 128 - 192 - or 256 bits
four modes of DES
AES
decryption
SSL
19. Mechanism for message authentication that uses one of two algorithms (SHA-1 or MDF5) in combination with a shared secret key - also known as keyed hashing
secure hash algorithms
WPA2
HMAC
IPSec
20. Free email security program that uses several algorithms - symmetric (IDEA) - asymmetric (RSA) and hashes (SHA1) and the web of trust
hashing
PG
block cipher
X.509
21. A special mathematical function that peforms one way encryption - popular algorithms are SHA and MD - used to verify message/file integrity and passwords
hashing
MIME
one time pad
encryption
22. Encrypting all data on a disk using common algorithms (AES) - requires a key (passpharse - USB key) in memory to decrypt disk
SHA-2
secure hash algorithms
whole disk encryption
tunneling
23. Method of encryption and decryption
cipher
HMAC
AES
steganography
24. A cryptographic protocol that provides security for communications over networks such as the Internet - more secure that SSL
TLS
steganography
NTLM
symmetric key
25. SHA-1 - MD2/ MD4 - MD5 - Fasthash - Triple DES-MAC - Tiger - and RIPEMD-160
secure hash algorithms
SSH
tunneling
DES
26. Sequence of bits used in encryption and decryption - also known as cryptovariable
RSA
key
secure hash algorithm
cryptography
27. Uses symmetric key for integrity and confidentiality (bulk transaction) and asymmetric key for authentication - nonrepudiation - and key exchange
S-HTTP
secure hash algorithms
hybrid cryptosystem
symmetric key
28. Tunneling protocol that merges PPTP with L2F - using port 1701 - is used over UDP - can be combined with IPSec for 5 layered encapsulation
Hash Message Authentication Code
steganography
L2TP
transport layer security
29. An algorithm developed to secure wireless - improperly implemented RC4 - only had a 40 bit key
one time pad
wired equivalency privacy
whole disk encryption
tunneling
30. Developed to strengthen DES - uses 3 keys (key clustering) to encrypt 3 times
secure hash algorithm
X.509
stream cipher
triple DES
31. Allow client/server applcation to communicate in a secure manner across a network - TLS stands for
SSL
HMAC
transport layer security
PPTP
32. Cryptographic algorithm that operates on plaintext - one bit at a time - and enciphers with a random generated "key stream" using substitution
PPTP
decryption
stream cipher
SHA-2
33. HMAC stands for...
wired equivalency privacy
digital signature
ciphertext
Hash Message Authentication Code
34. A cryptographic checksum used to provide integrity in symmetric key cryptography
hybrid
Message Authentication Code
unclassified data
wired equivalency privacy
35. Symmetric cryptography with MAC - asymmetric cryptography - and hashes provide __________
asymmetric key
whole disk encryption
IPSec
integrity
36. Process of transforming ciphertext into plaintext (decipherment)
decryption
TPM
secure hash algorithms
HMAC
37. Encrypted text - also called cryptogram
DES
integrity
non repudiation
ciphertext
38. RSA - Diffie and Hellman - Elliptic Curve (EC) - DSS (Digital Signature Standard) - El Gamal - Merkel-Hellman
integrity
asymmetric key algorithms
block cipher
cryptanalysis
39. The cipher considered unbreakable in practice - uses XOR - also called the Vernam cipher
Message Authentication Code
one time pad
cryptanalysis
stream cipher
40. DES - 3DES - AES - Twofish - Blowfish - IDEA - Skipjack - RC2 -RC4 - RC5 - RC6
secure hash algorithm
symmetric key algorithms
PPTP
SHA
41. Most efficient algorithm - used for smart cards and cell phones - provides digital signatures - secure key exchange - and encryption
plaintext
elliptic curve
one time pad
lanman
42. A secure cryptoprocessor embedded in the motherboard used to authenticate a hardware device - TPM stands for
four modes of DES
X.509
symmetric key algorithms
trusted platform module
43. Based on use of one private/secret key - does NOT provide authentication or nonrepudiation - uses MAC
wired equivalency privacy
X.509
symmetric key
cryptanalysis
44. Most widely used asymmetric algorithm - used for digital signatures - key exchange - and encryption
RSA
secure hash algorithms
non repudiation
hybrid cryptosystem
45. Runs on top of TLS on port 443 - protected against MITM attacks and creates secure connections
HMAC
PPTP
HTTPS
IPSec
46. Password storage hash for Windows systems after XP - uses MD4 and full unicode character set
IPSec
elliptic curve
cryptography
NTLM
47. Has a transport and tunnel mode - tunnel mode is used to create VPN connections
elliptic curve
IPSec
WPA2
encryption
48. Provides digests in different lengths including 224 - 256 - 384 - and 512
SHA-2
collision
decryption
symmetric ciphers
49. Encryption standard broken in 1998 - has a relatively short key length
HMAC
secure hash algorithms
DES
SSL
50. Based on two keys - public and private - one-way function: a key cannot decrypt what it encrypts - provides confidentiality - authentication - integrity - and nonrepudiation - Discovered by Diffie and Hellman - also known as public key
unclassified data
four modes of DES
asymmetric key
steganography