SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cryptography
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Pads messages to a length of 512 bits - then compresses to generate a 128 bit hash value
four modes of DES
MD5
digital signature
ciphertext
2. A cryptographic communications protocol at the transport layer that provides public key encryption (RSA or Diffie-Helman) - data encryption (IDEA - DES - 3DES) - server authentication - message integrity (MD5 or SHA-1) - and client authentication.
trusted platform module
SSL
TLS
block cipher
3. Encrypted text - also called cryptogram
lanman
ciphertext
plaintext
S/MIME
4. A secure cryptoprocessor embedded in the motherboard used to authenticate a hardware device - TPM stands for
trusted platform module
decryption
cryptography
X.509
5. Provides integrity - authentication - and non-repudiation by encrypting a message digest with a private key
digital signature
IPSec
plaintext
non repudiation
6. Most efficient algorithm - used for smart cards and cell phones - provides digital signatures - secure key exchange - and encryption
secure hash algorithms
plaintext
elliptic curve
lanman
7. Sender/receiver share the same key - fast - provides confidentiality - key management issue
symmetric key
plaintext
digital signature
asymmetric key
8. Protects against removing or installing a bogus hard drive using sealing (measuring system variables - BIOS - boot sector - firmware)
tunneling protocols
TPM
trusted platform module
L2TP
9. Used by WPA - uses RC4 with IV - blocks replay attacks with packet sequence counter - replaced by WPA2
IPSec
TKIP
cryptanalysis
trusted platform module
10. Data encryption standard derived from IBM Lucifer algorithm - 56-bit key - 64-bit block - uses the Data Encryption Algorithm (DEA)
confidentiality
RSA
wired equivalency privacy
DES
11. For encrypting web communications - uses Cryptographic Messaging Syntax (CMS) to protect individual message and response
RSA
collision
S-HTTP
symmetric key
12. Most widely used asymmetric algorithm - used for digital signatures - key exchange - and encryption
RSA
unclassified data
integrity
NTLM
13. Encryption standard broken in 1998 - has a relatively short key length
collision
trusted platform module
triple DES
DES
14. Digital signature standard that uses 2 algorithms: RSA and DSA (based on El Gamal) - both use the Secure Hash Standard (SHA-1)
S/MIME
TPM
tunneling protocols
DSS
15. Asymmetric cryptography - hashes - and digital signatures provide __________
steganography
DES
IPSec
non repudiation
16. Free email security program that uses several algorithms - symmetric (IDEA) - asymmetric (RSA) and hashes (SHA1) and the web of trust
SSH
hybrid
cryptography
PG
17. A protocol suite for securing network connections using IKE - AH - and ESP
symmetric key
TPM
SHA
IPSec
18. RSA - Diffie and Hellman - Elliptic Curve (EC) - DSS (Digital Signature Standard) - El Gamal - Merkel-Hellman
HTTPS
secure hash algorithms
asymmetric key algorithms
decryption
19. Provides digests in different lengths including 224 - 256 - 384 - and 512
PPTP
SHA-2
Hash Message Authentication Code
hashing
20. Technique of encapsulating one packet of data within another type to create a secure link of transportation
symmetric key
tunneling
DES
ciphertext
21. Two different pieces of data have the same hash value
cryptography
integrity
collision
plaintext
22. Selected by NIST for cryptographic hash functions for public use - 160 bit length
WPA2
SHA
encryption
symmetric key
23. Art of hiding communications - i.e. hide information in graphic files - sound files - or slack space.
HMAC
cryptography
steganography
decryption
24. A cryptographic checksum used to provide integrity in symmetric key cryptography
NTLM
secure hash algorithm
Message Authentication Code
PPTP
25. Common tunneling protocol integrated in Windows - works well with NAT - maybe blocked at firewall
PPTP
L2TP
hashing
trusted platform module
26. An algorithm developed to secure wireless - improperly implemented RC4 - only had a 40 bit key
cryptanalysis
wired equivalency privacy
one time pad
encryption
27. DES - 3DES - AES - Twofish - Blowfish - IDEA - Skipjack - RC2 -RC4 - RC5 - RC6
PPTP
non repudiation
symmetric key algorithms
hashing
28. Block and stream
AES
WPA2
encryption
symmetric ciphers
29. Encrypting all data on a disk using common algorithms (AES) - requires a key (passpharse - USB key) in memory to decrypt disk
decryption
X.509
whole disk encryption
asymmetric key
30. Security enhancement for MIME - provides signed (SHA-1) and encrypted (RSA and Diffe-Helman) email messasges
S/MIME
tunneling
S-HTTP
SHA
31. Password storage hash for Windows XP - separates password into two 7 character parts and converts to upper case
cryptanalysis
RSA
lanman
MIME
32. An algorithm developed to secure wireless that uses AES (CCMP + AES)
SHA-2
digital signature
WPA2
tunneling protocols
33. Runs on top of TLS on port 443 - protected against MITM attacks and creates secure connections
symmetric key
whole disk encryption
HTTPS
block cipher
34. Enciphers fixed-size blocks of bits using substitution and permutation
tunneling
symmetric key
block cipher
hybrid cryptosystem
35. Cipher block chaining (CBC) - cipher feedback (CFB) - electronic code book (ECB) and output feedback (OFB)
cryptanalysis
four modes of DES
IPSec
PPTP
36. PGP and SSH
PG
key
hybrid
RSA
37. Cryptographic algorithm that operates on plaintext - one bit at a time - and enciphers with a random generated "key stream" using substitution
S/MIME
hybrid
stream cipher
decryption
38. Mechanism for message authentication that uses one of two algorithms (SHA-1 or MDF5) in combination with a shared secret key - also known as keyed hashing
HMAC
non repudiation
NTLM
digital signature
39. Password storage hash for Windows systems after XP - uses MD4 and full unicode character set
NTLM
PG
symmetric key
stream cipher
40. Unencrypted text - also called cleartext
lanman
WPA2
cipher
plaintext
41. Method of encryption and decryption
encryption
IPSec
cipher
block cipher
42. Most widely used tunneling protocol - over port 1723 - data carried in an IP tunnel over Generic Routing Encapsulation (GRE)
PPTP
non repudiation
tunneling
SHA-2
43. Process of transforming plaintext into unreadable format
AES
encryption
block cipher
plaintext
44. Uses symmetric key for integrity and confidentiality (bulk transaction) and asymmetric key for authentication - nonrepudiation - and key exchange
hybrid cryptosystem
S-HTTP
triple DES
TLS
45. Allow client/server applcation to communicate in a secure manner across a network - TLS stands for
transport layer security
DES
whole disk encryption
DSS
46. SHA-1 - MD2/ MD4 - MD5 - Fasthash - Triple DES-MAC - Tiger - and RIPEMD-160
secure hash algorithms
wired equivalency privacy
elliptic curve
asymmetric key algorithms
47. Symmetric cryptography with MAC - asymmetric cryptography - and hashes provide __________
L2TP
DSS
encryption
integrity
48. Symmetric cryptography - asymmetric cryptography - and hashes provide __________
digital signature
hybrid cryptosystem
confidentiality
hashing
49. Based on two keys - public and private - one-way function: a key cannot decrypt what it encrypts - provides confidentiality - authentication - integrity - and nonrepudiation - Discovered by Diffie and Hellman - also known as public key
SSL
asymmetric key
asymmetric key algorithms
symmetric key
50. Developed to replace DES based on Rijndael variable block cipher - has a fixed block length and key lengths: 128 - 192 - or 256 bits
Hash Message Authentication Code
DES
AES
triple DES