SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cryptography
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A secure cryptoprocessor embedded in the motherboard used to authenticate a hardware device - TPM stands for
RSA
triple DES
DES
trusted platform module
2. AES Encryption standard used to protect sensitive but ________ - default key 128
Message Authentication Code
S/MIME
WPA2
unclassified data
3. Password storage hash for Windows systems after XP - uses MD4 and full unicode character set
NTLM
trusted platform module
WPA2
integrity
4. Developed to strengthen DES - uses 3 keys (key clustering) to encrypt 3 times
triple DES
symmetric ciphers
DES
SSH
5. Discovering the original message using other than normal means (i.e. "breaking" the cryptosystem)
AES
lanman
cryptanalysis
DES
6. Security enhancement for MIME - provides signed (SHA-1) and encrypted (RSA and Diffe-Helman) email messasges
triple DES
S/MIME
SHA-2
HMAC
7. Most widely used tunneling protocol - over port 1723 - data carried in an IP tunnel over Generic Routing Encapsulation (GRE)
confidentiality
WPA2
PPTP
SSH
8. A special mathematical function that peforms one way encryption - popular algorithms are SHA and MD - used to verify message/file integrity and passwords
hashing
IPSec
TKIP
transport layer security
9. Encrypted text - also called cryptogram
decryption
Message Authentication Code
ciphertext
cipher
10. Pads messages to a length of 512 bits - then compresses to generate a 128 bit hash value
triple DES
MD5
SHA-2
Message Authentication Code
11. HMAC stands for...
elliptic curve
Hash Message Authentication Code
L2TP
hashing
12. SHA-1 - MD2/ MD4 - MD5 - Fasthash - Triple DES-MAC - Tiger - and RIPEMD-160
symmetric ciphers
L2TP
cryptography
secure hash algorithms
13. Method of encryption and decryption
collision
digital signature
unclassified data
cipher
14. DES - 3DES - AES - Twofish - Blowfish - IDEA - Skipjack - RC2 -RC4 - RC5 - RC6
Message Authentication Code
symmetric key
L2TP
symmetric key algorithms
15. RSA - Diffie and Hellman - Elliptic Curve (EC) - DSS (Digital Signature Standard) - El Gamal - Merkel-Hellman
asymmetric key
elliptic curve
asymmetric key algorithms
collision
16. Sequence of bits used in encryption and decryption - also known as cryptovariable
SSH
IPSec
key
TLS
17. For encrypting web communications - uses Cryptographic Messaging Syntax (CMS) to protect individual message and response
S-HTTP
four modes of DES
PG
one time pad
18. The cipher considered unbreakable in practice - uses XOR - also called the Vernam cipher
one time pad
SHA-2
collision
cryptanalysis
19. Cryptographic algorithm that operates on plaintext - one bit at a time - and enciphers with a random generated "key stream" using substitution
lanman
TPM
cryptography
stream cipher
20. Mechanism for message authentication that uses one of two algorithms (SHA-1 or MDF5) in combination with a shared secret key - also known as keyed hashing
digital signature
HMAC
S/MIME
hashing
21. Selected by NIST for cryptographic hash functions for public use - 160 bit length
PPTP
integrity
SHA
HTTPS
22. Protects against removing or installing a bogus hard drive using sealing (measuring system variables - BIOS - boot sector - firmware)
wired equivalency privacy
DES
TPM
RSA
23. Provides digests in different lengths including 224 - 256 - 384 - and 512
secure hash algorithms
HTTPS
RSA
SHA-2
24. Common tunneling protocol integrated in Windows - works well with NAT - maybe blocked at firewall
DES
TLS
wired equivalency privacy
PPTP
25. PPTP - L2TP - IPSec - and SSH
X.509
tunneling protocols
four modes of DES
Message Authentication Code
26. Provides integrity - authentication - and non-repudiation by encrypting a message digest with a private key
digital signature
whole disk encryption
hybrid
symmetric key
27. Digital signature standard that uses 2 algorithms: RSA and DSA (based on El Gamal) - both use the Secure Hash Standard (SHA-1)
whole disk encryption
DSS
decryption
WPA2
28. Allow client/server applcation to communicate in a secure manner across a network - TLS stands for
plaintext
cryptography
transport layer security
MD5
29. Block and stream
secure hash algorithm
symmetric key
TKIP
symmetric ciphers
30. Sender/receiver share the same key - fast - provides confidentiality - key management issue
lanman
wired equivalency privacy
symmetric key
hybrid
31. Process of transforming plaintext into unreadable format
AES
HMAC
encryption
stream cipher
32. A cryptographic communications protocol at the transport layer that provides public key encryption (RSA or Diffie-Helman) - data encryption (IDEA - DES - 3DES) - server authentication - message integrity (MD5 or SHA-1) - and client authentication.
tunneling
TPM
SSL
four modes of DES
33. Encryption standard broken in 1998 - has a relatively short key length
TLS
DES
SSL
confidentiality
34. Tunneling protocol originally used on UNIX - uses port 22 - typically used for remote administration - replaces telnet and FTP
SSH
IPSec
TKIP
symmetric ciphers
35. Developed to replace DES based on Rijndael variable block cipher - has a fixed block length and key lengths: 128 - 192 - or 256 bits
asymmetric key algorithms
hybrid
X.509
AES
36. A cryptographic checksum used to provide integrity in symmetric key cryptography
Message Authentication Code
symmetric key
one time pad
stream cipher
37. PKI standard
plaintext
X.509
secure hash algorithm
symmetric key
38. Tunneling protocol that merges PPTP with L2F - using port 1701 - is used over UDP - can be combined with IPSec for 5 layered encapsulation
symmetric key
L2TP
asymmetric key
cipher
39. Enciphers fixed-size blocks of bits using substitution and permutation
integrity
block cipher
NTLM
lanman
40. Used by WPA - uses RC4 with IV - blocks replay attacks with packet sequence counter - replaced by WPA2
stream cipher
RSA
TKIP
secure hash algorithms
41. Has a transport and tunnel mode - tunnel mode is used to create VPN connections
TKIP
IPSec
SHA
triple DES
42. Technique of encapsulating one packet of data within another type to create a secure link of transportation
steganography
encryption
tunneling
symmetric key
43. Symmetric cryptography with MAC - asymmetric cryptography - and hashes provide __________
WPA2
L2TP
integrity
HMAC
44. Two different pieces of data have the same hash value
integrity
PG
MD5
collision
45. Unencrypted text - also called cleartext
plaintext
four modes of DES
digital signature
symmetric key
46. An algorithm developed to secure wireless - improperly implemented RC4 - only had a 40 bit key
MD5
wired equivalency privacy
HMAC
asymmetric key algorithms
47. A cryptographic protocol that provides security for communications over networks such as the Internet - more secure that SSL
TLS
integrity
RSA
IPSec
48. Altering the form of a message to disguise its meaning
PPTP
MD5
cryptography
DSS
49. Most efficient algorithm - used for smart cards and cell phones - provides digital signatures - secure key exchange - and encryption
secure hash algorithm
elliptic curve
L2TP
SHA-2
50. Data encryption standard derived from IBM Lucifer algorithm - 56-bit key - 64-bit block - uses the Data Encryption Algorithm (DEA)
SHA
digital signature
IPSec
DES