SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cryptography
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Block and stream
hybrid
collision
symmetric ciphers
HMAC
2. Based on use of one private/secret key - does NOT provide authentication or nonrepudiation - uses MAC
hybrid
decryption
SHA-2
symmetric key
3. DES - 3DES - AES - Twofish - Blowfish - IDEA - Skipjack - RC2 -RC4 - RC5 - RC6
hybrid
whole disk encryption
symmetric key algorithms
secure hash algorithm
4. Encrypted text - also called cryptogram
S/MIME
lanman
ciphertext
one time pad
5. Most widely used tunneling protocol - over port 1723 - data carried in an IP tunnel over Generic Routing Encapsulation (GRE)
NTLM
X.509
PPTP
decryption
6. For encrypting web communications - uses Cryptographic Messaging Syntax (CMS) to protect individual message and response
HTTPS
X.509
whole disk encryption
S-HTTP
7. Most efficient algorithm - used for smart cards and cell phones - provides digital signatures - secure key exchange - and encryption
elliptic curve
lanman
cryptanalysis
WPA2
8. Uses symmetric key for integrity and confidentiality (bulk transaction) and asymmetric key for authentication - nonrepudiation - and key exchange
encryption
hybrid cryptosystem
hybrid
wired equivalency privacy
9. Method of encryption and decryption
trusted platform module
cipher
Hash Message Authentication Code
L2TP
10. Sequence of bits used in encryption and decryption - also known as cryptovariable
ciphertext
one time pad
AES
key
11. Provides digests in different lengths including 224 - 256 - 384 - and 512
digital signature
cryptanalysis
SHA-2
hybrid cryptosystem
12. Has a transport and tunnel mode - tunnel mode is used to create VPN connections
triple DES
IPSec
NTLM
symmetric key
13. Most widely used asymmetric algorithm - used for digital signatures - key exchange - and encryption
RSA
symmetric key
integrity
steganography
14. An internet email standard format specifying how multimedia and attachments are handled
MIME
stream cipher
trusted platform module
SHA-2
15. Cipher block chaining (CBC) - cipher feedback (CFB) - electronic code book (ECB) and output feedback (OFB)
DES
collision
symmetric ciphers
four modes of DES
16. The cipher considered unbreakable in practice - uses XOR - also called the Vernam cipher
one time pad
digital signature
SSH
ciphertext
17. Common tunneling protocol integrated in Windows - works well with NAT - maybe blocked at firewall
non repudiation
L2TP
PPTP
tunneling protocols
18. PGP and SSH
key
digital signature
hybrid
symmetric ciphers
19. PKI standard
TKIP
X.509
digital signature
symmetric key
20. An algorithm developed to secure wireless - improperly implemented RC4 - only had a 40 bit key
tunneling protocols
TKIP
wired equivalency privacy
cipher
21. Technique of encapsulating one packet of data within another type to create a secure link of transportation
WPA2
PPTP
tunneling
ciphertext
22. Altering the form of a message to disguise its meaning
DSS
tunneling protocols
cryptography
hashing
23. Protects against removing or installing a bogus hard drive using sealing (measuring system variables - BIOS - boot sector - firmware)
integrity
encryption
TPM
hashing
24. Encryption standard broken in 1998 - has a relatively short key length
triple DES
DES
plaintext
S-HTTP
25. A secure cryptoprocessor embedded in the motherboard used to authenticate a hardware device - TPM stands for
wired equivalency privacy
trusted platform module
one time pad
symmetric key algorithms
26. Encrypting a message's hash value with a private key - DOES NOT ensure confidentiality
digital signature
SHA
symmetric ciphers
triple DES
27. Password storage hash for Windows XP - separates password into two 7 character parts and converts to upper case
steganography
lanman
S/MIME
asymmetric key algorithms
28. AES Encryption standard used to protect sensitive but ________ - default key 128
unclassified data
integrity
DES
plaintext
29. Tunneling protocol originally used on UNIX - uses port 22 - typically used for remote administration - replaces telnet and FTP
HMAC
SSH
NTLM
four modes of DES
30. Tunneling protocol that merges PPTP with L2F - using port 1701 - is used over UDP - can be combined with IPSec for 5 layered encapsulation
digital signature
TLS
L2TP
ciphertext
31. Asymmetric cryptography - hashes - and digital signatures provide __________
decryption
four modes of DES
non repudiation
wired equivalency privacy
32. Selected by NIST for cryptographic hash functions for public use - 160 bit length
TKIP
symmetric key
SHA
ciphertext
33. A protocol suite for securing network connections using IKE - AH - and ESP
trusted platform module
SSH
digital signature
IPSec
34. A cryptographic protocol that provides security for communications over networks such as the Internet - more secure that SSL
cryptanalysis
hybrid
asymmetric key
TLS
35. Art of hiding communications - i.e. hide information in graphic files - sound files - or slack space.
steganography
cryptanalysis
TPM
confidentiality
36. An algorithm developed to secure wireless that uses AES (CCMP + AES)
confidentiality
SHA-2
wired equivalency privacy
WPA2
37. PPTP - L2TP - IPSec - and SSH
transport layer security
tunneling protocols
SHA
hybrid cryptosystem
38. A cryptographic communications protocol at the transport layer that provides public key encryption (RSA or Diffie-Helman) - data encryption (IDEA - DES - 3DES) - server authentication - message integrity (MD5 or SHA-1) - and client authentication.
SSL
TLS
PPTP
cryptography
39. Impossible to find a message - given only message digest - impossible to find 2 messages that produce the same message digest
secure hash algorithm
TLS
stream cipher
PPTP
40. Unencrypted text - also called cleartext
plaintext
Hash Message Authentication Code
TKIP
cryptography
41. Discovering the original message using other than normal means (i.e. "breaking" the cryptosystem)
TLS
cryptanalysis
symmetric key
hybrid cryptosystem
42. Symmetric cryptography - asymmetric cryptography - and hashes provide __________
lanman
non repudiation
confidentiality
hybrid
43. RSA - Diffie and Hellman - Elliptic Curve (EC) - DSS (Digital Signature Standard) - El Gamal - Merkel-Hellman
PG
SHA-2
asymmetric key algorithms
key
44. Provides integrity - authentication - and non-repudiation by encrypting a message digest with a private key
integrity
PPTP
hybrid
digital signature
45. Used by WPA - uses RC4 with IV - blocks replay attacks with packet sequence counter - replaced by WPA2
hybrid
PG
TKIP
stream cipher
46. Runs on top of TLS on port 443 - protected against MITM attacks and creates secure connections
unclassified data
HTTPS
SHA
plaintext
47. Password storage hash for Windows systems after XP - uses MD4 and full unicode character set
encryption
stream cipher
NTLM
digital signature
48. Allow client/server applcation to communicate in a secure manner across a network - TLS stands for
digital signature
elliptic curve
transport layer security
stream cipher
49. Digital signature standard that uses 2 algorithms: RSA and DSA (based on El Gamal) - both use the Secure Hash Standard (SHA-1)
L2TP
DSS
integrity
S/MIME
50. HMAC stands for...
unclassified data
symmetric key algorithms
stream cipher
Hash Message Authentication Code
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests