SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cryptography
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Technique of encapsulating one packet of data within another type to create a secure link of transportation
non repudiation
NTLM
TPM
tunneling
2. Password storage hash for Windows systems after XP - uses MD4 and full unicode character set
stream cipher
digital signature
IPSec
NTLM
3. Altering the form of a message to disguise its meaning
whole disk encryption
cryptography
block cipher
one time pad
4. Pads messages to a length of 512 bits - then compresses to generate a 128 bit hash value
MD5
PPTP
transport layer security
DSS
5. A cryptographic checksum used to provide integrity in symmetric key cryptography
integrity
Message Authentication Code
block cipher
secure hash algorithm
6. Block and stream
AES
whole disk encryption
symmetric ciphers
key
7. HMAC stands for...
Hash Message Authentication Code
TKIP
PPTP
PG
8. Enciphers fixed-size blocks of bits using substitution and permutation
asymmetric key algorithms
block cipher
unclassified data
Message Authentication Code
9. Method of encryption and decryption
stream cipher
triple DES
encryption
cipher
10. Developed to strengthen DES - uses 3 keys (key clustering) to encrypt 3 times
TKIP
triple DES
hybrid
symmetric ciphers
11. Developed to replace DES based on Rijndael variable block cipher - has a fixed block length and key lengths: 128 - 192 - or 256 bits
stream cipher
AES
encryption
PPTP
12. Symmetric cryptography with MAC - asymmetric cryptography - and hashes provide __________
integrity
SSH
lanman
secure hash algorithms
13. Encrypted text - also called cryptogram
ciphertext
integrity
PPTP
cipher
14. Password storage hash for Windows XP - separates password into two 7 character parts and converts to upper case
lanman
steganography
cryptography
wired equivalency privacy
15. Allow client/server applcation to communicate in a secure manner across a network - TLS stands for
decryption
digital signature
transport layer security
TPM
16. PKI standard
secure hash algorithms
unclassified data
Hash Message Authentication Code
X.509
17. Digital signature standard that uses 2 algorithms: RSA and DSA (based on El Gamal) - both use the Secure Hash Standard (SHA-1)
Hash Message Authentication Code
SHA
NTLM
DSS
18. Two different pieces of data have the same hash value
collision
SSH
MD5
TPM
19. Used by WPA - uses RC4 with IV - blocks replay attacks with packet sequence counter - replaced by WPA2
encryption
four modes of DES
DES
TKIP
20. Sender/receiver share the same key - fast - provides confidentiality - key management issue
symmetric key
HMAC
TKIP
wired equivalency privacy
21. Based on two keys - public and private - one-way function: a key cannot decrypt what it encrypts - provides confidentiality - authentication - integrity - and nonrepudiation - Discovered by Diffie and Hellman - also known as public key
NTLM
asymmetric key
PG
MD5
22. Unencrypted text - also called cleartext
TPM
plaintext
DSS
hybrid
23. Cryptographic algorithm that operates on plaintext - one bit at a time - and enciphers with a random generated "key stream" using substitution
symmetric key
asymmetric key
stream cipher
triple DES
24. Process of transforming ciphertext into plaintext (decipherment)
IPSec
Hash Message Authentication Code
decryption
lanman
25. Most efficient algorithm - used for smart cards and cell phones - provides digital signatures - secure key exchange - and encryption
elliptic curve
S/MIME
PPTP
secure hash algorithm
26. Selected by NIST for cryptographic hash functions for public use - 160 bit length
TPM
Hash Message Authentication Code
WPA2
SHA
27. Runs on top of TLS on port 443 - protected against MITM attacks and creates secure connections
transport layer security
AES
HTTPS
RSA
28. For encrypting web communications - uses Cryptographic Messaging Syntax (CMS) to protect individual message and response
DES
asymmetric key algorithms
S-HTTP
Message Authentication Code
29. A cryptographic communications protocol at the transport layer that provides public key encryption (RSA or Diffie-Helman) - data encryption (IDEA - DES - 3DES) - server authentication - message integrity (MD5 or SHA-1) - and client authentication.
PPTP
SHA-2
SSL
decryption
30. Data encryption standard derived from IBM Lucifer algorithm - 56-bit key - 64-bit block - uses the Data Encryption Algorithm (DEA)
TLS
hashing
digital signature
DES
31. Encrypting a message's hash value with a private key - DOES NOT ensure confidentiality
symmetric key
WPA2
L2TP
digital signature
32. Has a transport and tunnel mode - tunnel mode is used to create VPN connections
IPSec
digital signature
symmetric key
SSL
33. An algorithm developed to secure wireless - improperly implemented RC4 - only had a 40 bit key
trusted platform module
S/MIME
wired equivalency privacy
AES
34. Discovering the original message using other than normal means (i.e. "breaking" the cryptosystem)
one time pad
wired equivalency privacy
PPTP
cryptanalysis
35. A secure cryptoprocessor embedded in the motherboard used to authenticate a hardware device - TPM stands for
SSL
PPTP
trusted platform module
hybrid
36. Symmetric cryptography - asymmetric cryptography - and hashes provide __________
ciphertext
confidentiality
encryption
secure hash algorithms
37. Tunneling protocol that merges PPTP with L2F - using port 1701 - is used over UDP - can be combined with IPSec for 5 layered encapsulation
PG
RSA
L2TP
AES
38. Cipher block chaining (CBC) - cipher feedback (CFB) - electronic code book (ECB) and output feedback (OFB)
IPSec
tunneling protocols
four modes of DES
Message Authentication Code
39. The cipher considered unbreakable in practice - uses XOR - also called the Vernam cipher
symmetric key
Hash Message Authentication Code
block cipher
one time pad
40. Common tunneling protocol integrated in Windows - works well with NAT - maybe blocked at firewall
DES
DSS
symmetric key
PPTP
41. Asymmetric cryptography - hashes - and digital signatures provide __________
triple DES
cipher
non repudiation
IPSec
42. Encrypting all data on a disk using common algorithms (AES) - requires a key (passpharse - USB key) in memory to decrypt disk
hashing
transport layer security
HTTPS
whole disk encryption
43. Uses symmetric key for integrity and confidentiality (bulk transaction) and asymmetric key for authentication - nonrepudiation - and key exchange
one time pad
S-HTTP
digital signature
hybrid cryptosystem
44. SHA-1 - MD2/ MD4 - MD5 - Fasthash - Triple DES-MAC - Tiger - and RIPEMD-160
secure hash algorithms
S-HTTP
elliptic curve
collision
45. PGP and SSH
hybrid
hybrid cryptosystem
lanman
MIME
46. Protects against removing or installing a bogus hard drive using sealing (measuring system variables - BIOS - boot sector - firmware)
TPM
MIME
X.509
asymmetric key
47. A special mathematical function that peforms one way encryption - popular algorithms are SHA and MD - used to verify message/file integrity and passwords
hashing
PG
four modes of DES
WPA2
48. Impossible to find a message - given only message digest - impossible to find 2 messages that produce the same message digest
tunneling protocols
trusted platform module
WPA2
secure hash algorithm
49. Provides digests in different lengths including 224 - 256 - 384 - and 512
symmetric ciphers
symmetric key
S/MIME
SHA-2
50. AES Encryption standard used to protect sensitive but ________ - default key 128
S/MIME
Hash Message Authentication Code
unclassified data
non repudiation