SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cryptography
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An algorithm developed to secure wireless - improperly implemented RC4 - only had a 40 bit key
HMAC
wired equivalency privacy
whole disk encryption
RSA
2. Provides integrity - authentication - and non-repudiation by encrypting a message digest with a private key
symmetric key algorithms
digital signature
TKIP
stream cipher
3. Data encryption standard derived from IBM Lucifer algorithm - 56-bit key - 64-bit block - uses the Data Encryption Algorithm (DEA)
S-HTTP
hashing
DES
transport layer security
4. Enciphers fixed-size blocks of bits using substitution and permutation
TKIP
PPTP
block cipher
tunneling
5. For encrypting web communications - uses Cryptographic Messaging Syntax (CMS) to protect individual message and response
S-HTTP
elliptic curve
cryptanalysis
integrity
6. Runs on top of TLS on port 443 - protected against MITM attacks and creates secure connections
HTTPS
stream cipher
Message Authentication Code
SSL
7. Digital signature standard that uses 2 algorithms: RSA and DSA (based on El Gamal) - both use the Secure Hash Standard (SHA-1)
DSS
cipher
non repudiation
tunneling protocols
8. Sender/receiver share the same key - fast - provides confidentiality - key management issue
hashing
collision
symmetric key
L2TP
9. Technique of encapsulating one packet of data within another type to create a secure link of transportation
encryption
tunneling
non repudiation
wired equivalency privacy
10. A cryptographic checksum used to provide integrity in symmetric key cryptography
non repudiation
HTTPS
Message Authentication Code
PPTP
11. Used by WPA - uses RC4 with IV - blocks replay attacks with packet sequence counter - replaced by WPA2
digital signature
RSA
wired equivalency privacy
TKIP
12. A cryptographic protocol that provides security for communications over networks such as the Internet - more secure that SSL
secure hash algorithm
TLS
non repudiation
tunneling protocols
13. Tunneling protocol that merges PPTP with L2F - using port 1701 - is used over UDP - can be combined with IPSec for 5 layered encapsulation
DES
L2TP
stream cipher
TPM
14. Developed to strengthen DES - uses 3 keys (key clustering) to encrypt 3 times
steganography
IPSec
PPTP
triple DES
15. Uses symmetric key for integrity and confidentiality (bulk transaction) and asymmetric key for authentication - nonrepudiation - and key exchange
integrity
hybrid cryptosystem
DES
NTLM
16. Cipher block chaining (CBC) - cipher feedback (CFB) - electronic code book (ECB) and output feedback (OFB)
digital signature
DES
confidentiality
four modes of DES
17. A protocol suite for securing network connections using IKE - AH - and ESP
MIME
stream cipher
IPSec
NTLM
18. An algorithm developed to secure wireless that uses AES (CCMP + AES)
WPA2
TKIP
decryption
DES
19. PKI standard
X.509
asymmetric key
SSH
trusted platform module
20. DES - 3DES - AES - Twofish - Blowfish - IDEA - Skipjack - RC2 -RC4 - RC5 - RC6
symmetric key algorithms
S/MIME
key
block cipher
21. Encrypting a message's hash value with a private key - DOES NOT ensure confidentiality
NTLM
digital signature
confidentiality
symmetric key
22. Encrypted text - also called cryptogram
ciphertext
SSH
transport layer security
DES
23. An internet email standard format specifying how multimedia and attachments are handled
cryptography
hashing
TKIP
MIME
24. Asymmetric cryptography - hashes - and digital signatures provide __________
unclassified data
digital signature
non repudiation
X.509
25. Symmetric cryptography with MAC - asymmetric cryptography - and hashes provide __________
integrity
RSA
stream cipher
TLS
26. Based on use of one private/secret key - does NOT provide authentication or nonrepudiation - uses MAC
IPSec
PPTP
key
symmetric key
27. Provides digests in different lengths including 224 - 256 - 384 - and 512
elliptic curve
SHA-2
ciphertext
S/MIME
28. Security enhancement for MIME - provides signed (SHA-1) and encrypted (RSA and Diffe-Helman) email messasges
cipher
confidentiality
S/MIME
MD5
29. Impossible to find a message - given only message digest - impossible to find 2 messages that produce the same message digest
symmetric ciphers
secure hash algorithm
cryptography
hybrid cryptosystem
30. AES Encryption standard used to protect sensitive but ________ - default key 128
four modes of DES
unclassified data
hybrid
HTTPS
31. Selected by NIST for cryptographic hash functions for public use - 160 bit length
AES
SHA
PPTP
L2TP
32. Mechanism for message authentication that uses one of two algorithms (SHA-1 or MDF5) in combination with a shared secret key - also known as keyed hashing
digital signature
asymmetric key algorithms
non repudiation
HMAC
33. Most widely used asymmetric algorithm - used for digital signatures - key exchange - and encryption
RSA
block cipher
hashing
SSL
34. Based on two keys - public and private - one-way function: a key cannot decrypt what it encrypts - provides confidentiality - authentication - integrity - and nonrepudiation - Discovered by Diffie and Hellman - also known as public key
secure hash algorithms
S/MIME
plaintext
asymmetric key
35. HMAC stands for...
lanman
block cipher
X.509
Hash Message Authentication Code
36. Sequence of bits used in encryption and decryption - also known as cryptovariable
cipher
key
SSH
PPTP
37. Process of transforming ciphertext into plaintext (decipherment)
NTLM
symmetric key algorithms
decryption
DES
38. Symmetric cryptography - asymmetric cryptography - and hashes provide __________
block cipher
secure hash algorithms
confidentiality
plaintext
39. RSA - Diffie and Hellman - Elliptic Curve (EC) - DSS (Digital Signature Standard) - El Gamal - Merkel-Hellman
asymmetric key algorithms
secure hash algorithm
cryptanalysis
Hash Message Authentication Code
40. Altering the form of a message to disguise its meaning
TKIP
confidentiality
cryptography
S/MIME
41. Pads messages to a length of 512 bits - then compresses to generate a 128 bit hash value
collision
confidentiality
Hash Message Authentication Code
MD5
42. A secure cryptoprocessor embedded in the motherboard used to authenticate a hardware device - TPM stands for
DES
DES
steganography
trusted platform module
43. Cryptographic algorithm that operates on plaintext - one bit at a time - and enciphers with a random generated "key stream" using substitution
SHA
stream cipher
IPSec
WPA2
44. PPTP - L2TP - IPSec - and SSH
HMAC
DES
tunneling protocols
HTTPS
45. Art of hiding communications - i.e. hide information in graphic files - sound files - or slack space.
steganography
DES
symmetric ciphers
wired equivalency privacy
46. Developed to replace DES based on Rijndael variable block cipher - has a fixed block length and key lengths: 128 - 192 - or 256 bits
stream cipher
PPTP
AES
SHA-2
47. Common tunneling protocol integrated in Windows - works well with NAT - maybe blocked at firewall
secure hash algorithms
stream cipher
PPTP
trusted platform module
48. Block and stream
symmetric ciphers
RSA
IPSec
lanman
49. Discovering the original message using other than normal means (i.e. "breaking" the cryptosystem)
symmetric key
HTTPS
cryptanalysis
IPSec
50. Two different pieces of data have the same hash value
PG
unclassified data
non repudiation
collision