SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cryptography
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Unencrypted text - also called cleartext
AES
PG
symmetric key
plaintext
2. Based on two keys - public and private - one-way function: a key cannot decrypt what it encrypts - provides confidentiality - authentication - integrity - and nonrepudiation - Discovered by Diffie and Hellman - also known as public key
WPA2
HMAC
asymmetric key
digital signature
3. Sequence of bits used in encryption and decryption - also known as cryptovariable
wired equivalency privacy
key
IPSec
X.509
4. Data encryption standard derived from IBM Lucifer algorithm - 56-bit key - 64-bit block - uses the Data Encryption Algorithm (DEA)
symmetric key algorithms
stream cipher
DES
cryptanalysis
5. The cipher considered unbreakable in practice - uses XOR - also called the Vernam cipher
wired equivalency privacy
hybrid cryptosystem
one time pad
cipher
6. An internet email standard format specifying how multimedia and attachments are handled
L2TP
AES
MIME
TPM
7. Most widely used tunneling protocol - over port 1723 - data carried in an IP tunnel over Generic Routing Encapsulation (GRE)
HMAC
asymmetric key
asymmetric key algorithms
PPTP
8. Art of hiding communications - i.e. hide information in graphic files - sound files - or slack space.
lanman
DES
asymmetric key algorithms
steganography
9. Free email security program that uses several algorithms - symmetric (IDEA) - asymmetric (RSA) and hashes (SHA1) and the web of trust
secure hash algorithms
plaintext
TPM
PG
10. Runs on top of TLS on port 443 - protected against MITM attacks and creates secure connections
ciphertext
HTTPS
symmetric ciphers
Message Authentication Code
11. DES - 3DES - AES - Twofish - Blowfish - IDEA - Skipjack - RC2 -RC4 - RC5 - RC6
hybrid cryptosystem
symmetric key algorithms
secure hash algorithm
cryptography
12. Based on use of one private/secret key - does NOT provide authentication or nonrepudiation - uses MAC
DES
TLS
symmetric key
encryption
13. Cipher block chaining (CBC) - cipher feedback (CFB) - electronic code book (ECB) and output feedback (OFB)
cryptography
WPA2
four modes of DES
S/MIME
14. Provides integrity - authentication - and non-repudiation by encrypting a message digest with a private key
Message Authentication Code
symmetric ciphers
digital signature
encryption
15. Pads messages to a length of 512 bits - then compresses to generate a 128 bit hash value
TKIP
MD5
TLS
S/MIME
16. Process of transforming plaintext into unreadable format
WPA2
PPTP
IPSec
encryption
17. Tunneling protocol that merges PPTP with L2F - using port 1701 - is used over UDP - can be combined with IPSec for 5 layered encapsulation
wired equivalency privacy
L2TP
plaintext
PPTP
18. An algorithm developed to secure wireless that uses AES (CCMP + AES)
non repudiation
SHA
WPA2
digital signature
19. Discovering the original message using other than normal means (i.e. "breaking" the cryptosystem)
cryptanalysis
DES
WPA2
decryption
20. Tunneling protocol originally used on UNIX - uses port 22 - typically used for remote administration - replaces telnet and FTP
DSS
SSH
collision
ciphertext
21. Used by WPA - uses RC4 with IV - blocks replay attacks with packet sequence counter - replaced by WPA2
asymmetric key algorithms
integrity
TKIP
DES
22. Protects against removing or installing a bogus hard drive using sealing (measuring system variables - BIOS - boot sector - firmware)
transport layer security
TPM
confidentiality
cipher
23. Common tunneling protocol integrated in Windows - works well with NAT - maybe blocked at firewall
symmetric key
digital signature
TKIP
PPTP
24. A protocol suite for securing network connections using IKE - AH - and ESP
PPTP
IPSec
S/MIME
stream cipher
25. Technique of encapsulating one packet of data within another type to create a secure link of transportation
symmetric ciphers
transport layer security
tunneling
elliptic curve
26. An algorithm developed to secure wireless - improperly implemented RC4 - only had a 40 bit key
hashing
S-HTTP
WPA2
wired equivalency privacy
27. Symmetric cryptography - asymmetric cryptography - and hashes provide __________
TPM
DES
digital signature
confidentiality
28. Password storage hash for Windows XP - separates password into two 7 character parts and converts to upper case
MIME
tunneling protocols
lanman
unclassified data
29. Enciphers fixed-size blocks of bits using substitution and permutation
block cipher
S/MIME
unclassified data
triple DES
30. Block and stream
TPM
ciphertext
symmetric ciphers
tunneling protocols
31. A cryptographic communications protocol at the transport layer that provides public key encryption (RSA or Diffie-Helman) - data encryption (IDEA - DES - 3DES) - server authentication - message integrity (MD5 or SHA-1) - and client authentication.
lanman
triple DES
SSL
confidentiality
32. A secure cryptoprocessor embedded in the motherboard used to authenticate a hardware device - TPM stands for
digital signature
trusted platform module
cryptanalysis
transport layer security
33. A cryptographic protocol that provides security for communications over networks such as the Internet - more secure that SSL
SHA
TLS
DSS
cryptography
34. Provides digests in different lengths including 224 - 256 - 384 - and 512
trusted platform module
tunneling
S/MIME
SHA-2
35. RSA - Diffie and Hellman - Elliptic Curve (EC) - DSS (Digital Signature Standard) - El Gamal - Merkel-Hellman
SSL
symmetric key
DES
asymmetric key algorithms
36. Encrypted text - also called cryptogram
L2TP
AES
ciphertext
hybrid cryptosystem
37. A special mathematical function that peforms one way encryption - popular algorithms are SHA and MD - used to verify message/file integrity and passwords
cryptography
hashing
TKIP
SSH
38. Password storage hash for Windows systems after XP - uses MD4 and full unicode character set
SSL
PPTP
stream cipher
NTLM
39. PGP and SSH
cipher
PG
hybrid
cryptanalysis
40. For encrypting web communications - uses Cryptographic Messaging Syntax (CMS) to protect individual message and response
S-HTTP
key
AES
ciphertext
41. SHA-1 - MD2/ MD4 - MD5 - Fasthash - Triple DES-MAC - Tiger - and RIPEMD-160
SHA-2
hybrid cryptosystem
cipher
secure hash algorithms
42. Method of encryption and decryption
Message Authentication Code
cipher
collision
PPTP
43. Symmetric cryptography with MAC - asymmetric cryptography - and hashes provide __________
stream cipher
RSA
integrity
Message Authentication Code
44. Encryption standard broken in 1998 - has a relatively short key length
RSA
cryptography
DES
integrity
45. Selected by NIST for cryptographic hash functions for public use - 160 bit length
secure hash algorithms
SHA
digital signature
collision
46. Uses symmetric key for integrity and confidentiality (bulk transaction) and asymmetric key for authentication - nonrepudiation - and key exchange
hybrid cryptosystem
TPM
MD5
trusted platform module
47. PKI standard
WPA2
SHA
X.509
asymmetric key
48. Security enhancement for MIME - provides signed (SHA-1) and encrypted (RSA and Diffe-Helman) email messasges
S/MIME
symmetric key
transport layer security
HTTPS
49. Developed to strengthen DES - uses 3 keys (key clustering) to encrypt 3 times
decryption
triple DES
cryptography
DES
50. AES Encryption standard used to protect sensitive but ________ - default key 128
non repudiation
cryptography
asymmetric key algorithms
unclassified data