SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cryptography
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Provides integrity - authentication - and non-repudiation by encrypting a message digest with a private key
confidentiality
digital signature
symmetric key
MD5
2. Process of transforming ciphertext into plaintext (decipherment)
stream cipher
NTLM
digital signature
decryption
3. Method of encryption and decryption
AES
cipher
HTTPS
non repudiation
4. Symmetric cryptography with MAC - asymmetric cryptography - and hashes provide __________
non repudiation
integrity
symmetric key algorithms
Message Authentication Code
5. Common tunneling protocol integrated in Windows - works well with NAT - maybe blocked at firewall
TLS
PPTP
TKIP
collision
6. Based on use of one private/secret key - does NOT provide authentication or nonrepudiation - uses MAC
transport layer security
cryptography
DSS
symmetric key
7. Encrypting all data on a disk using common algorithms (AES) - requires a key (passpharse - USB key) in memory to decrypt disk
HMAC
triple DES
hashing
whole disk encryption
8. Digital signature standard that uses 2 algorithms: RSA and DSA (based on El Gamal) - both use the Secure Hash Standard (SHA-1)
DSS
block cipher
encryption
DES
9. Encrypted text - also called cryptogram
ciphertext
IPSec
DES
SHA-2
10. Based on two keys - public and private - one-way function: a key cannot decrypt what it encrypts - provides confidentiality - authentication - integrity - and nonrepudiation - Discovered by Diffie and Hellman - also known as public key
steganography
asymmetric key
SHA
triple DES
11. Password storage hash for Windows XP - separates password into two 7 character parts and converts to upper case
symmetric key
decryption
lanman
cipher
12. AES Encryption standard used to protect sensitive but ________ - default key 128
unclassified data
cryptanalysis
confidentiality
lanman
13. SHA-1 - MD2/ MD4 - MD5 - Fasthash - Triple DES-MAC - Tiger - and RIPEMD-160
MIME
secure hash algorithms
non repudiation
PG
14. Altering the form of a message to disguise its meaning
PG
cryptography
secure hash algorithms
symmetric key
15. Block and stream
DSS
symmetric ciphers
hashing
confidentiality
16. Process of transforming plaintext into unreadable format
key
S/MIME
TKIP
encryption
17. Free email security program that uses several algorithms - symmetric (IDEA) - asymmetric (RSA) and hashes (SHA1) and the web of trust
PG
Hash Message Authentication Code
plaintext
MIME
18. Has a transport and tunnel mode - tunnel mode is used to create VPN connections
secure hash algorithms
unclassified data
triple DES
IPSec
19. DES - 3DES - AES - Twofish - Blowfish - IDEA - Skipjack - RC2 -RC4 - RC5 - RC6
symmetric key algorithms
IPSec
DES
stream cipher
20. PGP and SSH
ciphertext
cryptanalysis
hybrid
elliptic curve
21. Art of hiding communications - i.e. hide information in graphic files - sound files - or slack space.
one time pad
digital signature
steganography
TKIP
22. Encrypting a message's hash value with a private key - DOES NOT ensure confidentiality
four modes of DES
digital signature
SHA
asymmetric key
23. Encryption standard broken in 1998 - has a relatively short key length
DES
asymmetric key algorithms
symmetric key
block cipher
24. Asymmetric cryptography - hashes - and digital signatures provide __________
Message Authentication Code
confidentiality
Hash Message Authentication Code
non repudiation
25. Mechanism for message authentication that uses one of two algorithms (SHA-1 or MDF5) in combination with a shared secret key - also known as keyed hashing
symmetric ciphers
SHA-2
unclassified data
HMAC
26. The cipher considered unbreakable in practice - uses XOR - also called the Vernam cipher
SSH
IPSec
cipher
one time pad
27. Unencrypted text - also called cleartext
cryptography
SSL
plaintext
collision
28. A secure cryptoprocessor embedded in the motherboard used to authenticate a hardware device - TPM stands for
trusted platform module
confidentiality
SSL
S-HTTP
29. Password storage hash for Windows systems after XP - uses MD4 and full unicode character set
four modes of DES
NTLM
trusted platform module
DES
30. PPTP - L2TP - IPSec - and SSH
PPTP
HMAC
decryption
tunneling protocols
31. Most widely used tunneling protocol - over port 1723 - data carried in an IP tunnel over Generic Routing Encapsulation (GRE)
lanman
tunneling protocols
triple DES
PPTP
32. Impossible to find a message - given only message digest - impossible to find 2 messages that produce the same message digest
transport layer security
encryption
X.509
secure hash algorithm
33. A cryptographic protocol that provides security for communications over networks such as the Internet - more secure that SSL
SSH
one time pad
TLS
PPTP
34. Data encryption standard derived from IBM Lucifer algorithm - 56-bit key - 64-bit block - uses the Data Encryption Algorithm (DEA)
SHA-2
hybrid cryptosystem
encryption
DES
35. RSA - Diffie and Hellman - Elliptic Curve (EC) - DSS (Digital Signature Standard) - El Gamal - Merkel-Hellman
asymmetric key algorithms
SSL
symmetric ciphers
Hash Message Authentication Code
36. HMAC stands for...
symmetric key algorithms
S/MIME
Hash Message Authentication Code
hybrid cryptosystem
37. Selected by NIST for cryptographic hash functions for public use - 160 bit length
SHA
wired equivalency privacy
S/MIME
lanman
38. Uses symmetric key for integrity and confidentiality (bulk transaction) and asymmetric key for authentication - nonrepudiation - and key exchange
digital signature
lanman
hybrid
hybrid cryptosystem
39. Tunneling protocol originally used on UNIX - uses port 22 - typically used for remote administration - replaces telnet and FTP
triple DES
SSH
DES
NTLM
40. Technique of encapsulating one packet of data within another type to create a secure link of transportation
tunneling
DES
cipher
SSH
41. Symmetric cryptography - asymmetric cryptography - and hashes provide __________
key
AES
TKIP
confidentiality
42. Sender/receiver share the same key - fast - provides confidentiality - key management issue
S-HTTP
symmetric key
TPM
trusted platform module
43. Most efficient algorithm - used for smart cards and cell phones - provides digital signatures - secure key exchange - and encryption
wired equivalency privacy
WPA2
transport layer security
elliptic curve
44. A protocol suite for securing network connections using IKE - AH - and ESP
IPSec
L2TP
hybrid
wired equivalency privacy
45. An algorithm developed to secure wireless that uses AES (CCMP + AES)
NTLM
WPA2
four modes of DES
symmetric key
46. Sequence of bits used in encryption and decryption - also known as cryptovariable
MD5
key
L2TP
non repudiation
47. Most widely used asymmetric algorithm - used for digital signatures - key exchange - and encryption
tunneling protocols
NTLM
RSA
DES
48. Enciphers fixed-size blocks of bits using substitution and permutation
hashing
SHA
ciphertext
block cipher
49. A special mathematical function that peforms one way encryption - popular algorithms are SHA and MD - used to verify message/file integrity and passwords
MIME
hashing
PPTP
IPSec
50. Pads messages to a length of 512 bits - then compresses to generate a 128 bit hash value
cryptography
secure hash algorithm
MD5
IPSec