SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cryptography
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Most widely used tunneling protocol - over port 1723 - data carried in an IP tunnel over Generic Routing Encapsulation (GRE)
PPTP
lanman
cipher
IPSec
2. Used by WPA - uses RC4 with IV - blocks replay attacks with packet sequence counter - replaced by WPA2
HMAC
symmetric key
TKIP
X.509
3. Asymmetric cryptography - hashes - and digital signatures provide __________
DES
non repudiation
tunneling
hybrid cryptosystem
4. Sender/receiver share the same key - fast - provides confidentiality - key management issue
MD5
IPSec
stream cipher
symmetric key
5. An algorithm developed to secure wireless that uses AES (CCMP + AES)
TPM
WPA2
PPTP
MD5
6. Method of encryption and decryption
confidentiality
cipher
digital signature
S-HTTP
7. Common tunneling protocol integrated in Windows - works well with NAT - maybe blocked at firewall
cryptanalysis
S/MIME
steganography
PPTP
8. Developed to replace DES based on Rijndael variable block cipher - has a fixed block length and key lengths: 128 - 192 - or 256 bits
key
DES
PPTP
AES
9. Based on two keys - public and private - one-way function: a key cannot decrypt what it encrypts - provides confidentiality - authentication - integrity - and nonrepudiation - Discovered by Diffie and Hellman - also known as public key
whole disk encryption
PG
asymmetric key
DES
10. A cryptographic checksum used to provide integrity in symmetric key cryptography
HTTPS
Message Authentication Code
unclassified data
digital signature
11. Most efficient algorithm - used for smart cards and cell phones - provides digital signatures - secure key exchange - and encryption
elliptic curve
X.509
plaintext
SHA-2
12. A cryptographic communications protocol at the transport layer that provides public key encryption (RSA or Diffie-Helman) - data encryption (IDEA - DES - 3DES) - server authentication - message integrity (MD5 or SHA-1) - and client authentication.
SSL
DES
cryptanalysis
DES
13. Tunneling protocol originally used on UNIX - uses port 22 - typically used for remote administration - replaces telnet and FTP
SSH
wired equivalency privacy
MIME
whole disk encryption
14. Free email security program that uses several algorithms - symmetric (IDEA) - asymmetric (RSA) and hashes (SHA1) and the web of trust
PG
TKIP
digital signature
HMAC
15. RSA - Diffie and Hellman - Elliptic Curve (EC) - DSS (Digital Signature Standard) - El Gamal - Merkel-Hellman
digital signature
hashing
IPSec
asymmetric key algorithms
16. Process of transforming plaintext into unreadable format
DSS
unclassified data
WPA2
encryption
17. Tunneling protocol that merges PPTP with L2F - using port 1701 - is used over UDP - can be combined with IPSec for 5 layered encapsulation
cryptography
L2TP
secure hash algorithms
HMAC
18. Discovering the original message using other than normal means (i.e. "breaking" the cryptosystem)
PPTP
non repudiation
tunneling
cryptanalysis
19. Symmetric cryptography - asymmetric cryptography - and hashes provide __________
one time pad
IPSec
confidentiality
symmetric key
20. Encryption standard broken in 1998 - has a relatively short key length
tunneling protocols
symmetric key
MD5
DES
21. Provides digests in different lengths including 224 - 256 - 384 - and 512
SHA-2
cryptanalysis
wired equivalency privacy
one time pad
22. A cryptographic protocol that provides security for communications over networks such as the Internet - more secure that SSL
TLS
whole disk encryption
hybrid
ciphertext
23. Encrypted text - also called cryptogram
SSL
asymmetric key
stream cipher
ciphertext
24. Technique of encapsulating one packet of data within another type to create a secure link of transportation
confidentiality
cryptanalysis
hybrid
tunneling
25. Impossible to find a message - given only message digest - impossible to find 2 messages that produce the same message digest
symmetric key
secure hash algorithms
Hash Message Authentication Code
secure hash algorithm
26. Block and stream
symmetric key
symmetric ciphers
SSL
Hash Message Authentication Code
27. Runs on top of TLS on port 443 - protected against MITM attacks and creates secure connections
cryptanalysis
HTTPS
RSA
block cipher
28. Art of hiding communications - i.e. hide information in graphic files - sound files - or slack space.
steganography
PPTP
cryptanalysis
secure hash algorithm
29. PPTP - L2TP - IPSec - and SSH
IPSec
triple DES
tunneling protocols
X.509
30. An algorithm developed to secure wireless - improperly implemented RC4 - only had a 40 bit key
TPM
transport layer security
wired equivalency privacy
confidentiality
31. Has a transport and tunnel mode - tunnel mode is used to create VPN connections
IPSec
confidentiality
wired equivalency privacy
SHA-2
32. Cipher block chaining (CBC) - cipher feedback (CFB) - electronic code book (ECB) and output feedback (OFB)
four modes of DES
cipher
DES
Message Authentication Code
33. A secure cryptoprocessor embedded in the motherboard used to authenticate a hardware device - TPM stands for
symmetric key algorithms
lanman
trusted platform module
secure hash algorithm
34. DES - 3DES - AES - Twofish - Blowfish - IDEA - Skipjack - RC2 -RC4 - RC5 - RC6
collision
symmetric key algorithms
X.509
symmetric key
35. Cryptographic algorithm that operates on plaintext - one bit at a time - and enciphers with a random generated "key stream" using substitution
TKIP
hybrid
stream cipher
MD5
36. Encrypting all data on a disk using common algorithms (AES) - requires a key (passpharse - USB key) in memory to decrypt disk
asymmetric key
cryptography
symmetric key algorithms
whole disk encryption
37. Most widely used asymmetric algorithm - used for digital signatures - key exchange - and encryption
TKIP
MIME
whole disk encryption
RSA
38. Pads messages to a length of 512 bits - then compresses to generate a 128 bit hash value
cipher
digital signature
S/MIME
MD5
39. Digital signature standard that uses 2 algorithms: RSA and DSA (based on El Gamal) - both use the Secure Hash Standard (SHA-1)
SHA-2
Hash Message Authentication Code
DSS
key
40. Symmetric cryptography with MAC - asymmetric cryptography - and hashes provide __________
RSA
Message Authentication Code
integrity
block cipher
41. Enciphers fixed-size blocks of bits using substitution and permutation
encryption
block cipher
AES
hashing
42. Two different pieces of data have the same hash value
collision
SHA
IPSec
RSA
43. A protocol suite for securing network connections using IKE - AH - and ESP
IPSec
DES
MIME
hashing
44. Security enhancement for MIME - provides signed (SHA-1) and encrypted (RSA and Diffe-Helman) email messasges
RSA
S/MIME
SHA-2
S-HTTP
45. A special mathematical function that peforms one way encryption - popular algorithms are SHA and MD - used to verify message/file integrity and passwords
hashing
decryption
transport layer security
DSS
46. Password storage hash for Windows systems after XP - uses MD4 and full unicode character set
S/MIME
hybrid cryptosystem
NTLM
cryptography
47. Data encryption standard derived from IBM Lucifer algorithm - 56-bit key - 64-bit block - uses the Data Encryption Algorithm (DEA)
plaintext
key
DES
lanman
48. For encrypting web communications - uses Cryptographic Messaging Syntax (CMS) to protect individual message and response
symmetric key algorithms
S/MIME
cryptography
S-HTTP
49. Encrypting a message's hash value with a private key - DOES NOT ensure confidentiality
PG
digital signature
DES
DES
50. Developed to strengthen DES - uses 3 keys (key clustering) to encrypt 3 times
symmetric key
Hash Message Authentication Code
secure hash algorithms
triple DES