SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cryptography
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Process of transforming ciphertext into plaintext (decipherment)
integrity
decryption
whole disk encryption
asymmetric key algorithms
2. Developed to replace DES based on Rijndael variable block cipher - has a fixed block length and key lengths: 128 - 192 - or 256 bits
S/MIME
unclassified data
AES
L2TP
3. An algorithm developed to secure wireless - improperly implemented RC4 - only had a 40 bit key
ciphertext
wired equivalency privacy
asymmetric key
tunneling
4. The cipher considered unbreakable in practice - uses XOR - also called the Vernam cipher
transport layer security
wired equivalency privacy
symmetric ciphers
one time pad
5. SHA-1 - MD2/ MD4 - MD5 - Fasthash - Triple DES-MAC - Tiger - and RIPEMD-160
secure hash algorithms
HMAC
TPM
cryptanalysis
6. Altering the form of a message to disguise its meaning
TPM
digital signature
cryptography
stream cipher
7. Password storage hash for Windows systems after XP - uses MD4 and full unicode character set
trusted platform module
NTLM
IPSec
S/MIME
8. Provides digests in different lengths including 224 - 256 - 384 - and 512
Message Authentication Code
asymmetric key
SHA-2
transport layer security
9. Common tunneling protocol integrated in Windows - works well with NAT - maybe blocked at firewall
PPTP
DES
transport layer security
tunneling protocols
10. Enciphers fixed-size blocks of bits using substitution and permutation
cipher
hybrid cryptosystem
S-HTTP
block cipher
11. Process of transforming plaintext into unreadable format
encryption
TLS
DSS
HTTPS
12. Data encryption standard derived from IBM Lucifer algorithm - 56-bit key - 64-bit block - uses the Data Encryption Algorithm (DEA)
plaintext
steganography
X.509
DES
13. PKI standard
triple DES
symmetric key algorithms
X.509
WPA2
14. Uses symmetric key for integrity and confidentiality (bulk transaction) and asymmetric key for authentication - nonrepudiation - and key exchange
DSS
unclassified data
tunneling protocols
hybrid cryptosystem
15. Selected by NIST for cryptographic hash functions for public use - 160 bit length
secure hash algorithm
digital signature
lanman
SHA
16. Tunneling protocol originally used on UNIX - uses port 22 - typically used for remote administration - replaces telnet and FTP
SSL
SSH
digital signature
L2TP
17. Asymmetric cryptography - hashes - and digital signatures provide __________
Message Authentication Code
secure hash algorithm
non repudiation
cryptography
18. Symmetric cryptography with MAC - asymmetric cryptography - and hashes provide __________
integrity
steganography
hashing
AES
19. Most efficient algorithm - used for smart cards and cell phones - provides digital signatures - secure key exchange - and encryption
Message Authentication Code
elliptic curve
digital signature
PPTP
20. RSA - Diffie and Hellman - Elliptic Curve (EC) - DSS (Digital Signature Standard) - El Gamal - Merkel-Hellman
ciphertext
Message Authentication Code
asymmetric key algorithms
confidentiality
21. Most widely used tunneling protocol - over port 1723 - data carried in an IP tunnel over Generic Routing Encapsulation (GRE)
PPTP
encryption
plaintext
MIME
22. Mechanism for message authentication that uses one of two algorithms (SHA-1 or MDF5) in combination with a shared secret key - also known as keyed hashing
PPTP
key
SSH
HMAC
23. Tunneling protocol that merges PPTP with L2F - using port 1701 - is used over UDP - can be combined with IPSec for 5 layered encapsulation
ciphertext
L2TP
secure hash algorithm
DES
24. Sequence of bits used in encryption and decryption - also known as cryptovariable
symmetric key algorithms
DES
key
unclassified data
25. A special mathematical function that peforms one way encryption - popular algorithms are SHA and MD - used to verify message/file integrity and passwords
hashing
RSA
IPSec
hybrid cryptosystem
26. Unencrypted text - also called cleartext
AES
Hash Message Authentication Code
plaintext
key
27. Method of encryption and decryption
S-HTTP
digital signature
cipher
triple DES
28. Encryption standard broken in 1998 - has a relatively short key length
Message Authentication Code
NTLM
DES
Hash Message Authentication Code
29. Password storage hash for Windows XP - separates password into two 7 character parts and converts to upper case
lanman
SHA-2
trusted platform module
elliptic curve
30. A cryptographic protocol that provides security for communications over networks such as the Internet - more secure that SSL
S-HTTP
symmetric key
TLS
DES
31. Encrypting all data on a disk using common algorithms (AES) - requires a key (passpharse - USB key) in memory to decrypt disk
DSS
whole disk encryption
PG
decryption
32. Runs on top of TLS on port 443 - protected against MITM attacks and creates secure connections
collision
SHA-2
HTTPS
digital signature
33. Cipher block chaining (CBC) - cipher feedback (CFB) - electronic code book (ECB) and output feedback (OFB)
symmetric ciphers
four modes of DES
collision
hybrid
34. An internet email standard format specifying how multimedia and attachments are handled
X.509
trusted platform module
encryption
MIME
35. An algorithm developed to secure wireless that uses AES (CCMP + AES)
WPA2
hybrid
DSS
secure hash algorithms
36. Has a transport and tunnel mode - tunnel mode is used to create VPN connections
wired equivalency privacy
IPSec
cryptography
triple DES
37. Encrypting a message's hash value with a private key - DOES NOT ensure confidentiality
non repudiation
DES
secure hash algorithm
digital signature
38. Pads messages to a length of 512 bits - then compresses to generate a 128 bit hash value
Message Authentication Code
SHA-2
MD5
cipher
39. Most widely used asymmetric algorithm - used for digital signatures - key exchange - and encryption
symmetric key algorithms
SSH
digital signature
RSA
40. Security enhancement for MIME - provides signed (SHA-1) and encrypted (RSA and Diffe-Helman) email messasges
transport layer security
plaintext
S/MIME
SSH
41. For encrypting web communications - uses Cryptographic Messaging Syntax (CMS) to protect individual message and response
S-HTTP
key
MD5
hybrid cryptosystem
42. A cryptographic checksum used to provide integrity in symmetric key cryptography
DES
cryptanalysis
L2TP
Message Authentication Code
43. Protects against removing or installing a bogus hard drive using sealing (measuring system variables - BIOS - boot sector - firmware)
wired equivalency privacy
four modes of DES
hybrid
TPM
44. Based on two keys - public and private - one-way function: a key cannot decrypt what it encrypts - provides confidentiality - authentication - integrity - and nonrepudiation - Discovered by Diffie and Hellman - also known as public key
confidentiality
SHA-2
AES
asymmetric key
45. Art of hiding communications - i.e. hide information in graphic files - sound files - or slack space.
block cipher
asymmetric key
S-HTTP
steganography
46. Block and stream
symmetric ciphers
S/MIME
tunneling protocols
cryptography
47. Cryptographic algorithm that operates on plaintext - one bit at a time - and enciphers with a random generated "key stream" using substitution
stream cipher
whole disk encryption
WPA2
unclassified data
48. Two different pieces of data have the same hash value
TKIP
collision
DES
symmetric ciphers
49. AES Encryption standard used to protect sensitive but ________ - default key 128
ciphertext
encryption
unclassified data
integrity
50. A protocol suite for securing network connections using IKE - AH - and ESP
TLS
TKIP
IPSec
decryption