SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cryptography
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Process of transforming plaintext into unreadable format
WPA2
TLS
AES
encryption
2. Password storage hash for Windows systems after XP - uses MD4 and full unicode character set
NTLM
key
IPSec
WPA2
3. Based on two keys - public and private - one-way function: a key cannot decrypt what it encrypts - provides confidentiality - authentication - integrity - and nonrepudiation - Discovered by Diffie and Hellman - also known as public key
S-HTTP
steganography
asymmetric key
non repudiation
4. Security enhancement for MIME - provides signed (SHA-1) and encrypted (RSA and Diffe-Helman) email messasges
AES
S/MIME
Message Authentication Code
NTLM
5. Common tunneling protocol integrated in Windows - works well with NAT - maybe blocked at firewall
block cipher
DES
PPTP
digital signature
6. Protects against removing or installing a bogus hard drive using sealing (measuring system variables - BIOS - boot sector - firmware)
ciphertext
asymmetric key
S-HTTP
TPM
7. Process of transforming ciphertext into plaintext (decipherment)
cipher
decryption
Message Authentication Code
SSL
8. Sender/receiver share the same key - fast - provides confidentiality - key management issue
symmetric key
plaintext
collision
L2TP
9. AES Encryption standard used to protect sensitive but ________ - default key 128
TLS
unclassified data
HMAC
symmetric key algorithms
10. Symmetric cryptography with MAC - asymmetric cryptography - and hashes provide __________
TPM
SHA
integrity
TKIP
11. Used by WPA - uses RC4 with IV - blocks replay attacks with packet sequence counter - replaced by WPA2
decryption
S/MIME
hashing
TKIP
12. Provides integrity - authentication - and non-repudiation by encrypting a message digest with a private key
symmetric ciphers
plaintext
integrity
digital signature
13. SHA-1 - MD2/ MD4 - MD5 - Fasthash - Triple DES-MAC - Tiger - and RIPEMD-160
AES
digital signature
L2TP
secure hash algorithms
14. Tunneling protocol that merges PPTP with L2F - using port 1701 - is used over UDP - can be combined with IPSec for 5 layered encapsulation
tunneling
ciphertext
L2TP
TPM
15. An algorithm developed to secure wireless that uses AES (CCMP + AES)
WPA2
SSH
integrity
decryption
16. Encrypting all data on a disk using common algorithms (AES) - requires a key (passpharse - USB key) in memory to decrypt disk
cipher
hybrid cryptosystem
whole disk encryption
collision
17. Based on use of one private/secret key - does NOT provide authentication or nonrepudiation - uses MAC
IPSec
triple DES
asymmetric key algorithms
symmetric key
18. HMAC stands for...
elliptic curve
Hash Message Authentication Code
PPTP
one time pad
19. Runs on top of TLS on port 443 - protected against MITM attacks and creates secure connections
HTTPS
SHA-2
cipher
PPTP
20. Cipher block chaining (CBC) - cipher feedback (CFB) - electronic code book (ECB) and output feedback (OFB)
L2TP
WPA2
four modes of DES
MD5
21. An internet email standard format specifying how multimedia and attachments are handled
cryptanalysis
MIME
X.509
S/MIME
22. For encrypting web communications - uses Cryptographic Messaging Syntax (CMS) to protect individual message and response
S-HTTP
digital signature
NTLM
S/MIME
23. Most widely used tunneling protocol - over port 1723 - data carried in an IP tunnel over Generic Routing Encapsulation (GRE)
secure hash algorithm
digital signature
hybrid cryptosystem
PPTP
24. Asymmetric cryptography - hashes - and digital signatures provide __________
asymmetric key algorithms
non repudiation
MD5
hybrid cryptosystem
25. Developed to replace DES based on Rijndael variable block cipher - has a fixed block length and key lengths: 128 - 192 - or 256 bits
PPTP
AES
lanman
WPA2
26. Uses symmetric key for integrity and confidentiality (bulk transaction) and asymmetric key for authentication - nonrepudiation - and key exchange
hybrid cryptosystem
triple DES
digital signature
decryption
27. Developed to strengthen DES - uses 3 keys (key clustering) to encrypt 3 times
PPTP
MIME
TLS
triple DES
28. Art of hiding communications - i.e. hide information in graphic files - sound files - or slack space.
steganography
lanman
encryption
DES
29. Impossible to find a message - given only message digest - impossible to find 2 messages that produce the same message digest
whole disk encryption
DES
plaintext
secure hash algorithm
30. PGP and SSH
cryptanalysis
hybrid
Hash Message Authentication Code
AES
31. A cryptographic checksum used to provide integrity in symmetric key cryptography
plaintext
SHA
SSL
Message Authentication Code
32. A cryptographic communications protocol at the transport layer that provides public key encryption (RSA or Diffie-Helman) - data encryption (IDEA - DES - 3DES) - server authentication - message integrity (MD5 or SHA-1) - and client authentication.
SSL
TPM
plaintext
stream cipher
33. A secure cryptoprocessor embedded in the motherboard used to authenticate a hardware device - TPM stands for
DES
trusted platform module
TLS
elliptic curve
34. Mechanism for message authentication that uses one of two algorithms (SHA-1 or MDF5) in combination with a shared secret key - also known as keyed hashing
asymmetric key algorithms
PPTP
RSA
HMAC
35. Allow client/server applcation to communicate in a secure manner across a network - TLS stands for
symmetric key
MIME
wired equivalency privacy
transport layer security
36. Most widely used asymmetric algorithm - used for digital signatures - key exchange - and encryption
RSA
Hash Message Authentication Code
hybrid
hybrid cryptosystem
37. Provides digests in different lengths including 224 - 256 - 384 - and 512
non repudiation
SSH
collision
SHA-2
38. Data encryption standard derived from IBM Lucifer algorithm - 56-bit key - 64-bit block - uses the Data Encryption Algorithm (DEA)
PPTP
steganography
DES
transport layer security
39. DES - 3DES - AES - Twofish - Blowfish - IDEA - Skipjack - RC2 -RC4 - RC5 - RC6
ciphertext
unclassified data
symmetric key algorithms
transport layer security
40. Two different pieces of data have the same hash value
symmetric key
SSL
collision
encryption
41. Pads messages to a length of 512 bits - then compresses to generate a 128 bit hash value
S-HTTP
SSH
elliptic curve
MD5
42. Encrypted text - also called cryptogram
ciphertext
plaintext
non repudiation
S-HTTP
43. A protocol suite for securing network connections using IKE - AH - and ESP
RSA
cryptanalysis
IPSec
transport layer security
44. Method of encryption and decryption
cipher
Hash Message Authentication Code
transport layer security
integrity
45. Selected by NIST for cryptographic hash functions for public use - 160 bit length
plaintext
SSH
L2TP
SHA
46. The cipher considered unbreakable in practice - uses XOR - also called the Vernam cipher
HMAC
one time pad
NTLM
hashing
47. Password storage hash for Windows XP - separates password into two 7 character parts and converts to upper case
PG
PPTP
X.509
lanman
48. Unencrypted text - also called cleartext
plaintext
Message Authentication Code
encryption
TLS
49. Symmetric cryptography - asymmetric cryptography - and hashes provide __________
confidentiality
TPM
SSH
HTTPS
50. Has a transport and tunnel mode - tunnel mode is used to create VPN connections
tunneling protocols
RSA
IPSec
cryptography