SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cryptography
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Digital signature standard that uses 2 algorithms: RSA and DSA (based on El Gamal) - both use the Secure Hash Standard (SHA-1)
PG
TPM
SHA-2
DSS
2. Pads messages to a length of 512 bits - then compresses to generate a 128 bit hash value
MD5
trusted platform module
integrity
TPM
3. Asymmetric cryptography - hashes - and digital signatures provide __________
non repudiation
symmetric key
S/MIME
four modes of DES
4. Allow client/server applcation to communicate in a secure manner across a network - TLS stands for
Message Authentication Code
SHA
triple DES
transport layer security
5. Mechanism for message authentication that uses one of two algorithms (SHA-1 or MDF5) in combination with a shared secret key - also known as keyed hashing
cryptography
S-HTTP
hybrid cryptosystem
HMAC
6. Process of transforming ciphertext into plaintext (decipherment)
hybrid
ciphertext
block cipher
decryption
7. Has a transport and tunnel mode - tunnel mode is used to create VPN connections
IPSec
NTLM
DES
AES
8. Two different pieces of data have the same hash value
collision
IPSec
tunneling protocols
TLS
9. Common tunneling protocol integrated in Windows - works well with NAT - maybe blocked at firewall
PPTP
L2TP
X.509
secure hash algorithms
10. DES - 3DES - AES - Twofish - Blowfish - IDEA - Skipjack - RC2 -RC4 - RC5 - RC6
SSL
asymmetric key
secure hash algorithm
symmetric key algorithms
11. Used by WPA - uses RC4 with IV - blocks replay attacks with packet sequence counter - replaced by WPA2
symmetric ciphers
trusted platform module
SHA-2
TKIP
12. Selected by NIST for cryptographic hash functions for public use - 160 bit length
TPM
SHA
digital signature
secure hash algorithms
13. Discovering the original message using other than normal means (i.e. "breaking" the cryptosystem)
cryptanalysis
tunneling
TKIP
hybrid cryptosystem
14. A cryptographic checksum used to provide integrity in symmetric key cryptography
HMAC
whole disk encryption
Message Authentication Code
TPM
15. Uses symmetric key for integrity and confidentiality (bulk transaction) and asymmetric key for authentication - nonrepudiation - and key exchange
IPSec
hybrid cryptosystem
DSS
steganography
16. A protocol suite for securing network connections using IKE - AH - and ESP
hashing
IPSec
digital signature
Message Authentication Code
17. Most widely used tunneling protocol - over port 1723 - data carried in an IP tunnel over Generic Routing Encapsulation (GRE)
PPTP
SHA-2
L2TP
TLS
18. Most widely used asymmetric algorithm - used for digital signatures - key exchange - and encryption
PPTP
DSS
ciphertext
RSA
19. Free email security program that uses several algorithms - symmetric (IDEA) - asymmetric (RSA) and hashes (SHA1) and the web of trust
PG
IPSec
symmetric ciphers
IPSec
20. Unencrypted text - also called cleartext
plaintext
wired equivalency privacy
decryption
ciphertext
21. Block and stream
triple DES
one time pad
DSS
symmetric ciphers
22. Encrypting a message's hash value with a private key - DOES NOT ensure confidentiality
digital signature
S-HTTP
secure hash algorithm
Hash Message Authentication Code
23. An internet email standard format specifying how multimedia and attachments are handled
DES
MIME
hashing
symmetric key algorithms
24. A special mathematical function that peforms one way encryption - popular algorithms are SHA and MD - used to verify message/file integrity and passwords
MIME
digital signature
secure hash algorithm
hashing
25. Encrypting all data on a disk using common algorithms (AES) - requires a key (passpharse - USB key) in memory to decrypt disk
whole disk encryption
symmetric key algorithms
tunneling
asymmetric key algorithms
26. PKI standard
steganography
X.509
one time pad
tunneling
27. Symmetric cryptography with MAC - asymmetric cryptography - and hashes provide __________
secure hash algorithms
collision
integrity
encryption
28. Altering the form of a message to disguise its meaning
cryptography
DES
tunneling protocols
SHA-2
29. Art of hiding communications - i.e. hide information in graphic files - sound files - or slack space.
steganography
symmetric key
collision
TLS
30. Encryption standard broken in 1998 - has a relatively short key length
secure hash algorithms
RSA
decryption
DES
31. Provides digests in different lengths including 224 - 256 - 384 - and 512
one time pad
SHA-2
unclassified data
triple DES
32. Sender/receiver share the same key - fast - provides confidentiality - key management issue
HMAC
block cipher
RSA
symmetric key
33. Impossible to find a message - given only message digest - impossible to find 2 messages that produce the same message digest
cryptography
TPM
symmetric key algorithms
secure hash algorithm
34. SHA-1 - MD2/ MD4 - MD5 - Fasthash - Triple DES-MAC - Tiger - and RIPEMD-160
hybrid cryptosystem
secure hash algorithms
whole disk encryption
MIME
35. Method of encryption and decryption
cipher
symmetric key
whole disk encryption
secure hash algorithms
36. Security enhancement for MIME - provides signed (SHA-1) and encrypted (RSA and Diffe-Helman) email messasges
cipher
TPM
S/MIME
tunneling protocols
37. RSA - Diffie and Hellman - Elliptic Curve (EC) - DSS (Digital Signature Standard) - El Gamal - Merkel-Hellman
tunneling protocols
asymmetric key
asymmetric key algorithms
secure hash algorithm
38. Password storage hash for Windows systems after XP - uses MD4 and full unicode character set
trusted platform module
Message Authentication Code
NTLM
PPTP
39. Symmetric cryptography - asymmetric cryptography - and hashes provide __________
confidentiality
secure hash algorithms
hybrid
asymmetric key algorithms
40. An algorithm developed to secure wireless that uses AES (CCMP + AES)
WPA2
X.509
cipher
MIME
41. Process of transforming plaintext into unreadable format
cryptanalysis
non repudiation
transport layer security
encryption
42. AES Encryption standard used to protect sensitive but ________ - default key 128
lanman
IPSec
key
unclassified data
43. Cipher block chaining (CBC) - cipher feedback (CFB) - electronic code book (ECB) and output feedback (OFB)
PG
DES
four modes of DES
hashing
44. A cryptographic protocol that provides security for communications over networks such as the Internet - more secure that SSL
TLS
SHA
confidentiality
X.509
45. Data encryption standard derived from IBM Lucifer algorithm - 56-bit key - 64-bit block - uses the Data Encryption Algorithm (DEA)
SSL
DES
digital signature
symmetric ciphers
46. HMAC stands for...
PPTP
IPSec
Hash Message Authentication Code
one time pad
47. Runs on top of TLS on port 443 - protected against MITM attacks and creates secure connections
non repudiation
HTTPS
tunneling protocols
triple DES
48. Encrypted text - also called cryptogram
asymmetric key
secure hash algorithm
ciphertext
TKIP
49. A cryptographic communications protocol at the transport layer that provides public key encryption (RSA or Diffie-Helman) - data encryption (IDEA - DES - 3DES) - server authentication - message integrity (MD5 or SHA-1) - and client authentication.
SSL
symmetric key
asymmetric key algorithms
hashing
50. Developed to strengthen DES - uses 3 keys (key clustering) to encrypt 3 times
HMAC
RSA
TLS
triple DES