SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cryptography
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A cryptographic checksum used to provide integrity in symmetric key cryptography
one time pad
cryptography
Message Authentication Code
IPSec
2. Pads messages to a length of 512 bits - then compresses to generate a 128 bit hash value
MIME
symmetric ciphers
TKIP
MD5
3. Password storage hash for Windows XP - separates password into two 7 character parts and converts to upper case
symmetric ciphers
PG
lanman
HMAC
4. Provides integrity - authentication - and non-repudiation by encrypting a message digest with a private key
digital signature
symmetric key
plaintext
MIME
5. Sender/receiver share the same key - fast - provides confidentiality - key management issue
L2TP
cryptography
symmetric key
HTTPS
6. A special mathematical function that peforms one way encryption - popular algorithms are SHA and MD - used to verify message/file integrity and passwords
unclassified data
tunneling protocols
hashing
S/MIME
7. Unencrypted text - also called cleartext
digital signature
MIME
unclassified data
plaintext
8. Common tunneling protocol integrated in Windows - works well with NAT - maybe blocked at firewall
PPTP
one time pad
tunneling
symmetric key algorithms
9. Most widely used tunneling protocol - over port 1723 - data carried in an IP tunnel over Generic Routing Encapsulation (GRE)
TLS
non repudiation
PPTP
HTTPS
10. Tunneling protocol that merges PPTP with L2F - using port 1701 - is used over UDP - can be combined with IPSec for 5 layered encapsulation
L2TP
symmetric key
TLS
TKIP
11. Password storage hash for Windows systems after XP - uses MD4 and full unicode character set
S/MIME
MD5
NTLM
HTTPS
12. PPTP - L2TP - IPSec - and SSH
Message Authentication Code
asymmetric key
collision
tunneling protocols
13. Encryption standard broken in 1998 - has a relatively short key length
DES
RSA
ciphertext
non repudiation
14. Used by WPA - uses RC4 with IV - blocks replay attacks with packet sequence counter - replaced by WPA2
TKIP
S/MIME
S-HTTP
transport layer security
15. Data encryption standard derived from IBM Lucifer algorithm - 56-bit key - 64-bit block - uses the Data Encryption Algorithm (DEA)
L2TP
steganography
integrity
DES
16. Based on two keys - public and private - one-way function: a key cannot decrypt what it encrypts - provides confidentiality - authentication - integrity - and nonrepudiation - Discovered by Diffie and Hellman - also known as public key
four modes of DES
non repudiation
asymmetric key
TKIP
17. Uses symmetric key for integrity and confidentiality (bulk transaction) and asymmetric key for authentication - nonrepudiation - and key exchange
stream cipher
hybrid cryptosystem
non repudiation
symmetric key
18. DES - 3DES - AES - Twofish - Blowfish - IDEA - Skipjack - RC2 -RC4 - RC5 - RC6
symmetric ciphers
digital signature
symmetric key algorithms
S-HTTP
19. Developed to replace DES based on Rijndael variable block cipher - has a fixed block length and key lengths: 128 - 192 - or 256 bits
one time pad
AES
SSL
PPTP
20. The cipher considered unbreakable in practice - uses XOR - also called the Vernam cipher
unclassified data
RSA
one time pad
Message Authentication Code
21. For encrypting web communications - uses Cryptographic Messaging Syntax (CMS) to protect individual message and response
asymmetric key algorithms
S-HTTP
AES
TPM
22. A cryptographic protocol that provides security for communications over networks such as the Internet - more secure that SSL
tunneling
AES
TLS
PPTP
23. Process of transforming ciphertext into plaintext (decipherment)
plaintext
decryption
S-HTTP
cryptography
24. Encrypting all data on a disk using common algorithms (AES) - requires a key (passpharse - USB key) in memory to decrypt disk
whole disk encryption
tunneling
DSS
Hash Message Authentication Code
25. Enciphers fixed-size blocks of bits using substitution and permutation
block cipher
elliptic curve
steganography
integrity
26. Asymmetric cryptography - hashes - and digital signatures provide __________
secure hash algorithm
asymmetric key algorithms
non repudiation
secure hash algorithms
27. SHA-1 - MD2/ MD4 - MD5 - Fasthash - Triple DES-MAC - Tiger - and RIPEMD-160
RSA
stream cipher
secure hash algorithms
non repudiation
28. Cipher block chaining (CBC) - cipher feedback (CFB) - electronic code book (ECB) and output feedback (OFB)
DES
non repudiation
four modes of DES
TPM
29. A cryptographic communications protocol at the transport layer that provides public key encryption (RSA or Diffie-Helman) - data encryption (IDEA - DES - 3DES) - server authentication - message integrity (MD5 or SHA-1) - and client authentication.
SSL
lanman
cipher
L2TP
30. Provides digests in different lengths including 224 - 256 - 384 - and 512
lanman
S-HTTP
SHA-2
digital signature
31. Allow client/server applcation to communicate in a secure manner across a network - TLS stands for
symmetric key
TPM
transport layer security
TLS
32. Impossible to find a message - given only message digest - impossible to find 2 messages that produce the same message digest
collision
IPSec
secure hash algorithm
RSA
33. RSA - Diffie and Hellman - Elliptic Curve (EC) - DSS (Digital Signature Standard) - El Gamal - Merkel-Hellman
key
MD5
asymmetric key algorithms
unclassified data
34. A protocol suite for securing network connections using IKE - AH - and ESP
IPSec
DES
cryptography
TLS
35. Cryptographic algorithm that operates on plaintext - one bit at a time - and enciphers with a random generated "key stream" using substitution
wired equivalency privacy
L2TP
Message Authentication Code
stream cipher
36. Most efficient algorithm - used for smart cards and cell phones - provides digital signatures - secure key exchange - and encryption
PPTP
elliptic curve
integrity
SSL
37. PGP and SSH
L2TP
hybrid
DES
RSA
38. Digital signature standard that uses 2 algorithms: RSA and DSA (based on El Gamal) - both use the Secure Hash Standard (SHA-1)
MD5
decryption
secure hash algorithm
DSS
39. Mechanism for message authentication that uses one of two algorithms (SHA-1 or MDF5) in combination with a shared secret key - also known as keyed hashing
lanman
hybrid
S/MIME
HMAC
40. Based on use of one private/secret key - does NOT provide authentication or nonrepudiation - uses MAC
symmetric key
confidentiality
PPTP
cryptography
41. HMAC stands for...
S-HTTP
hybrid cryptosystem
HMAC
Hash Message Authentication Code
42. Sequence of bits used in encryption and decryption - also known as cryptovariable
key
cryptography
triple DES
MD5
43. Technique of encapsulating one packet of data within another type to create a secure link of transportation
SSH
tunneling
trusted platform module
encryption
44. Has a transport and tunnel mode - tunnel mode is used to create VPN connections
symmetric key algorithms
whole disk encryption
DSS
IPSec
45. Method of encryption and decryption
ciphertext
AES
cipher
MD5
46. Encrypted text - also called cryptogram
ciphertext
S-HTTP
DES
integrity
47. Symmetric cryptography - asymmetric cryptography - and hashes provide __________
confidentiality
secure hash algorithm
plaintext
symmetric key
48. PKI standard
SHA
asymmetric key algorithms
lanman
X.509
49. An algorithm developed to secure wireless - improperly implemented RC4 - only had a 40 bit key
wired equivalency privacy
MD5
encryption
PG
50. Security enhancement for MIME - provides signed (SHA-1) and encrypted (RSA and Diffe-Helman) email messasges
integrity
S/MIME
lanman
transport layer security
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests