SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cryptography
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. SHA-1 - MD2/ MD4 - MD5 - Fasthash - Triple DES-MAC - Tiger - and RIPEMD-160
secure hash algorithms
Message Authentication Code
cryptanalysis
encryption
2. Unencrypted text - also called cleartext
plaintext
DES
IPSec
SSH
3. Data encryption standard derived from IBM Lucifer algorithm - 56-bit key - 64-bit block - uses the Data Encryption Algorithm (DEA)
hybrid cryptosystem
DES
L2TP
elliptic curve
4. Cryptographic algorithm that operates on plaintext - one bit at a time - and enciphers with a random generated "key stream" using substitution
symmetric ciphers
one time pad
triple DES
stream cipher
5. Digital signature standard that uses 2 algorithms: RSA and DSA (based on El Gamal) - both use the Secure Hash Standard (SHA-1)
MD5
cryptography
PPTP
DSS
6. Protects against removing or installing a bogus hard drive using sealing (measuring system variables - BIOS - boot sector - firmware)
block cipher
TPM
tunneling protocols
digital signature
7. Developed to strengthen DES - uses 3 keys (key clustering) to encrypt 3 times
RSA
triple DES
TPM
hybrid cryptosystem
8. Has a transport and tunnel mode - tunnel mode is used to create VPN connections
tunneling
IPSec
key
hybrid
9. Most efficient algorithm - used for smart cards and cell phones - provides digital signatures - secure key exchange - and encryption
one time pad
DES
S-HTTP
elliptic curve
10. PKI standard
DES
SSH
symmetric ciphers
X.509
11. HMAC stands for...
hybrid
Hash Message Authentication Code
tunneling protocols
WPA2
12. Asymmetric cryptography - hashes - and digital signatures provide __________
TKIP
non repudiation
DSS
tunneling protocols
13. Method of encryption and decryption
MIME
cipher
cryptography
RSA
14. Art of hiding communications - i.e. hide information in graphic files - sound files - or slack space.
steganography
digital signature
digital signature
ciphertext
15. Password storage hash for Windows systems after XP - uses MD4 and full unicode character set
stream cipher
AES
NTLM
TLS
16. A cryptographic checksum used to provide integrity in symmetric key cryptography
non repudiation
DES
block cipher
Message Authentication Code
17. Mechanism for message authentication that uses one of two algorithms (SHA-1 or MDF5) in combination with a shared secret key - also known as keyed hashing
HTTPS
HMAC
asymmetric key algorithms
symmetric key
18. A cryptographic communications protocol at the transport layer that provides public key encryption (RSA or Diffie-Helman) - data encryption (IDEA - DES - 3DES) - server authentication - message integrity (MD5 or SHA-1) - and client authentication.
SSL
DES
hashing
S/MIME
19. A secure cryptoprocessor embedded in the motherboard used to authenticate a hardware device - TPM stands for
block cipher
non repudiation
transport layer security
trusted platform module
20. Provides digests in different lengths including 224 - 256 - 384 - and 512
SHA-2
PPTP
hybrid
HMAC
21. A cryptographic protocol that provides security for communications over networks such as the Internet - more secure that SSL
symmetric key
Message Authentication Code
TLS
TKIP
22. Runs on top of TLS on port 443 - protected against MITM attacks and creates secure connections
PPTP
X.509
cryptography
HTTPS
23. An algorithm developed to secure wireless that uses AES (CCMP + AES)
block cipher
cipher
WPA2
cryptography
24. Tunneling protocol that merges PPTP with L2F - using port 1701 - is used over UDP - can be combined with IPSec for 5 layered encapsulation
PG
TLS
stream cipher
L2TP
25. Cipher block chaining (CBC) - cipher feedback (CFB) - electronic code book (ECB) and output feedback (OFB)
four modes of DES
key
encryption
collision
26. The cipher considered unbreakable in practice - uses XOR - also called the Vernam cipher
SSH
lanman
X.509
one time pad
27. Process of transforming plaintext into unreadable format
block cipher
stream cipher
encryption
SHA
28. Sequence of bits used in encryption and decryption - also known as cryptovariable
non repudiation
key
collision
four modes of DES
29. AES Encryption standard used to protect sensitive but ________ - default key 128
HMAC
cryptanalysis
unclassified data
integrity
30. PGP and SSH
MIME
hybrid
SHA-2
IPSec
31. Symmetric cryptography with MAC - asymmetric cryptography - and hashes provide __________
ciphertext
S/MIME
cipher
integrity
32. Password storage hash for Windows XP - separates password into two 7 character parts and converts to upper case
lanman
elliptic curve
TLS
PG
33. Technique of encapsulating one packet of data within another type to create a secure link of transportation
triple DES
DES
tunneling
SHA
34. Based on two keys - public and private - one-way function: a key cannot decrypt what it encrypts - provides confidentiality - authentication - integrity - and nonrepudiation - Discovered by Diffie and Hellman - also known as public key
asymmetric key
X.509
stream cipher
key
35. Sender/receiver share the same key - fast - provides confidentiality - key management issue
DES
symmetric key
Message Authentication Code
secure hash algorithm
36. Most widely used asymmetric algorithm - used for digital signatures - key exchange - and encryption
whole disk encryption
plaintext
RSA
SSH
37. Block and stream
symmetric ciphers
PG
hashing
ciphertext
38. Developed to replace DES based on Rijndael variable block cipher - has a fixed block length and key lengths: 128 - 192 - or 256 bits
elliptic curve
secure hash algorithms
AES
wired equivalency privacy
39. Encrypting a message's hash value with a private key - DOES NOT ensure confidentiality
hybrid cryptosystem
digital signature
PG
symmetric ciphers
40. An internet email standard format specifying how multimedia and attachments are handled
AES
L2TP
MIME
lanman
41. Provides integrity - authentication - and non-repudiation by encrypting a message digest with a private key
decryption
tunneling protocols
hybrid cryptosystem
digital signature
42. Security enhancement for MIME - provides signed (SHA-1) and encrypted (RSA and Diffe-Helman) email messasges
S/MIME
symmetric key algorithms
IPSec
key
43. DES - 3DES - AES - Twofish - Blowfish - IDEA - Skipjack - RC2 -RC4 - RC5 - RC6
key
asymmetric key algorithms
triple DES
symmetric key algorithms
44. Two different pieces of data have the same hash value
symmetric ciphers
TKIP
collision
WPA2
45. PPTP - L2TP - IPSec - and SSH
block cipher
plaintext
stream cipher
tunneling protocols
46. A protocol suite for securing network connections using IKE - AH - and ESP
IPSec
hashing
symmetric key algorithms
tunneling protocols
47. Free email security program that uses several algorithms - symmetric (IDEA) - asymmetric (RSA) and hashes (SHA1) and the web of trust
PG
HTTPS
ciphertext
SHA
48. Impossible to find a message - given only message digest - impossible to find 2 messages that produce the same message digest
NTLM
S-HTTP
secure hash algorithm
cryptography
49. Selected by NIST for cryptographic hash functions for public use - 160 bit length
SHA
PPTP
stream cipher
RSA
50. Allow client/server applcation to communicate in a secure manner across a network - TLS stands for
transport layer security
PPTP
Hash Message Authentication Code
ciphertext