SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cryptography
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. For encrypting web communications - uses Cryptographic Messaging Syntax (CMS) to protect individual message and response
S-HTTP
TKIP
IPSec
decryption
2. Most widely used asymmetric algorithm - used for digital signatures - key exchange - and encryption
symmetric key
MD5
RSA
hashing
3. Tunneling protocol that merges PPTP with L2F - using port 1701 - is used over UDP - can be combined with IPSec for 5 layered encapsulation
L2TP
X.509
cipher
block cipher
4. Uses symmetric key for integrity and confidentiality (bulk transaction) and asymmetric key for authentication - nonrepudiation - and key exchange
digital signature
transport layer security
hybrid cryptosystem
PG
5. Asymmetric cryptography - hashes - and digital signatures provide __________
unclassified data
tunneling protocols
secure hash algorithm
non repudiation
6. Protects against removing or installing a bogus hard drive using sealing (measuring system variables - BIOS - boot sector - firmware)
digital signature
IPSec
TKIP
TPM
7. Symmetric cryptography with MAC - asymmetric cryptography - and hashes provide __________
PG
hybrid cryptosystem
stream cipher
integrity
8. Free email security program that uses several algorithms - symmetric (IDEA) - asymmetric (RSA) and hashes (SHA1) and the web of trust
unclassified data
integrity
PG
ciphertext
9. Technique of encapsulating one packet of data within another type to create a secure link of transportation
digital signature
WPA2
tunneling
key
10. Developed to replace DES based on Rijndael variable block cipher - has a fixed block length and key lengths: 128 - 192 - or 256 bits
AES
hybrid cryptosystem
HTTPS
Message Authentication Code
11. An internet email standard format specifying how multimedia and attachments are handled
transport layer security
ciphertext
MIME
hybrid
12. Developed to strengthen DES - uses 3 keys (key clustering) to encrypt 3 times
collision
digital signature
triple DES
WPA2
13. HMAC stands for...
four modes of DES
secure hash algorithm
SSH
Hash Message Authentication Code
14. A cryptographic communications protocol at the transport layer that provides public key encryption (RSA or Diffie-Helman) - data encryption (IDEA - DES - 3DES) - server authentication - message integrity (MD5 or SHA-1) - and client authentication.
MD5
WPA2
S/MIME
SSL
15. Cryptographic algorithm that operates on plaintext - one bit at a time - and enciphers with a random generated "key stream" using substitution
decryption
IPSec
symmetric key
stream cipher
16. Most efficient algorithm - used for smart cards and cell phones - provides digital signatures - secure key exchange - and encryption
symmetric key algorithms
tunneling protocols
elliptic curve
asymmetric key algorithms
17. RSA - Diffie and Hellman - Elliptic Curve (EC) - DSS (Digital Signature Standard) - El Gamal - Merkel-Hellman
DSS
AES
steganography
asymmetric key algorithms
18. Based on use of one private/secret key - does NOT provide authentication or nonrepudiation - uses MAC
asymmetric key
RSA
symmetric key
whole disk encryption
19. A special mathematical function that peforms one way encryption - popular algorithms are SHA and MD - used to verify message/file integrity and passwords
hashing
hybrid
SSL
confidentiality
20. Art of hiding communications - i.e. hide information in graphic files - sound files - or slack space.
digital signature
symmetric key algorithms
steganography
block cipher
21. Method of encryption and decryption
secure hash algorithms
cipher
confidentiality
triple DES
22. Sequence of bits used in encryption and decryption - also known as cryptovariable
encryption
HTTPS
key
secure hash algorithm
23. Security enhancement for MIME - provides signed (SHA-1) and encrypted (RSA and Diffe-Helman) email messasges
integrity
cryptanalysis
S/MIME
transport layer security
24. Impossible to find a message - given only message digest - impossible to find 2 messages that produce the same message digest
secure hash algorithm
transport layer security
cryptography
TPM
25. Unencrypted text - also called cleartext
symmetric key
IPSec
plaintext
wired equivalency privacy
26. SHA-1 - MD2/ MD4 - MD5 - Fasthash - Triple DES-MAC - Tiger - and RIPEMD-160
PG
asymmetric key
secure hash algorithms
SSL
27. DES - 3DES - AES - Twofish - Blowfish - IDEA - Skipjack - RC2 -RC4 - RC5 - RC6
tunneling protocols
SSH
symmetric key algorithms
unclassified data
28. Block and stream
HMAC
symmetric ciphers
MD5
lanman
29. Process of transforming plaintext into unreadable format
hybrid cryptosystem
elliptic curve
encryption
TKIP
30. AES Encryption standard used to protect sensitive but ________ - default key 128
unclassified data
SSH
DSS
X.509
31. Enciphers fixed-size blocks of bits using substitution and permutation
TKIP
block cipher
AES
triple DES
32. A secure cryptoprocessor embedded in the motherboard used to authenticate a hardware device - TPM stands for
digital signature
trusted platform module
triple DES
stream cipher
33. Digital signature standard that uses 2 algorithms: RSA and DSA (based on El Gamal) - both use the Secure Hash Standard (SHA-1)
tunneling protocols
transport layer security
encryption
DSS
34. A cryptographic protocol that provides security for communications over networks such as the Internet - more secure that SSL
Message Authentication Code
hybrid
TLS
digital signature
35. Symmetric cryptography - asymmetric cryptography - and hashes provide __________
decryption
confidentiality
S/MIME
non repudiation
36. Used by WPA - uses RC4 with IV - blocks replay attacks with packet sequence counter - replaced by WPA2
PPTP
TKIP
IPSec
SHA-2
37. Allow client/server applcation to communicate in a secure manner across a network - TLS stands for
TLS
asymmetric key
HTTPS
transport layer security
38. Most widely used tunneling protocol - over port 1723 - data carried in an IP tunnel over Generic Routing Encapsulation (GRE)
IPSec
elliptic curve
tunneling protocols
PPTP
39. An algorithm developed to secure wireless that uses AES (CCMP + AES)
block cipher
key
DSS
WPA2
40. Password storage hash for Windows XP - separates password into two 7 character parts and converts to upper case
non repudiation
secure hash algorithm
trusted platform module
lanman
41. PPTP - L2TP - IPSec - and SSH
asymmetric key
RSA
hashing
tunneling protocols
42. The cipher considered unbreakable in practice - uses XOR - also called the Vernam cipher
DES
TKIP
wired equivalency privacy
one time pad
43. PGP and SSH
lanman
hybrid
SSL
key
44. An algorithm developed to secure wireless - improperly implemented RC4 - only had a 40 bit key
wired equivalency privacy
tunneling protocols
secure hash algorithms
IPSec
45. Mechanism for message authentication that uses one of two algorithms (SHA-1 or MDF5) in combination with a shared secret key - also known as keyed hashing
key
stream cipher
HMAC
SHA-2
46. Process of transforming ciphertext into plaintext (decipherment)
block cipher
PG
decryption
DES
47. Encrypted text - also called cryptogram
S-HTTP
NTLM
SSL
ciphertext
48. Provides digests in different lengths including 224 - 256 - 384 - and 512
asymmetric key algorithms
SHA-2
symmetric ciphers
elliptic curve
49. Tunneling protocol originally used on UNIX - uses port 22 - typically used for remote administration - replaces telnet and FTP
secure hash algorithm
X.509
elliptic curve
SSH
50. Discovering the original message using other than normal means (i.e. "breaking" the cryptosystem)
cryptanalysis
key
hashing
HMAC