SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cryptography
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Enciphers fixed-size blocks of bits using substitution and permutation
block cipher
symmetric key
secure hash algorithm
elliptic curve
2. Impossible to find a message - given only message digest - impossible to find 2 messages that produce the same message digest
SHA
wired equivalency privacy
secure hash algorithms
secure hash algorithm
3. DES - 3DES - AES - Twofish - Blowfish - IDEA - Skipjack - RC2 -RC4 - RC5 - RC6
symmetric key algorithms
symmetric key
WPA2
collision
4. Encrypting all data on a disk using common algorithms (AES) - requires a key (passpharse - USB key) in memory to decrypt disk
non repudiation
hybrid
whole disk encryption
tunneling
5. Technique of encapsulating one packet of data within another type to create a secure link of transportation
DES
hybrid
tunneling
symmetric key
6. An algorithm developed to secure wireless - improperly implemented RC4 - only had a 40 bit key
transport layer security
IPSec
encryption
wired equivalency privacy
7. Most widely used tunneling protocol - over port 1723 - data carried in an IP tunnel over Generic Routing Encapsulation (GRE)
HTTPS
Hash Message Authentication Code
PPTP
DES
8. Two different pieces of data have the same hash value
symmetric key
collision
hashing
digital signature
9. AES Encryption standard used to protect sensitive but ________ - default key 128
cryptanalysis
asymmetric key
unclassified data
IPSec
10. Tunneling protocol that merges PPTP with L2F - using port 1701 - is used over UDP - can be combined with IPSec for 5 layered encapsulation
SSL
L2TP
RSA
collision
11. Used by WPA - uses RC4 with IV - blocks replay attacks with packet sequence counter - replaced by WPA2
TKIP
Hash Message Authentication Code
confidentiality
symmetric key
12. A cryptographic communications protocol at the transport layer that provides public key encryption (RSA or Diffie-Helman) - data encryption (IDEA - DES - 3DES) - server authentication - message integrity (MD5 or SHA-1) - and client authentication.
SHA
SSL
MD5
tunneling
13. A protocol suite for securing network connections using IKE - AH - and ESP
IPSec
PPTP
Hash Message Authentication Code
MD5
14. Data encryption standard derived from IBM Lucifer algorithm - 56-bit key - 64-bit block - uses the Data Encryption Algorithm (DEA)
X.509
SSH
DES
confidentiality
15. Based on use of one private/secret key - does NOT provide authentication or nonrepudiation - uses MAC
symmetric key
TLS
MD5
TKIP
16. Encrypted text - also called cryptogram
DES
symmetric key
DES
ciphertext
17. An algorithm developed to secure wireless that uses AES (CCMP + AES)
WPA2
L2TP
IPSec
AES
18. Most widely used asymmetric algorithm - used for digital signatures - key exchange - and encryption
IPSec
RSA
wired equivalency privacy
collision
19. Runs on top of TLS on port 443 - protected against MITM attacks and creates secure connections
plaintext
WPA2
triple DES
HTTPS
20. HMAC stands for...
Hash Message Authentication Code
X.509
wired equivalency privacy
steganography
21. Mechanism for message authentication that uses one of two algorithms (SHA-1 or MDF5) in combination with a shared secret key - also known as keyed hashing
AES
four modes of DES
HMAC
decryption
22. Altering the form of a message to disguise its meaning
PG
cryptography
MD5
DES
23. Has a transport and tunnel mode - tunnel mode is used to create VPN connections
X.509
IPSec
cryptanalysis
digital signature
24. Discovering the original message using other than normal means (i.e. "breaking" the cryptosystem)
symmetric ciphers
block cipher
unclassified data
cryptanalysis
25. Process of transforming ciphertext into plaintext (decipherment)
secure hash algorithms
decryption
SHA
cipher
26. Free email security program that uses several algorithms - symmetric (IDEA) - asymmetric (RSA) and hashes (SHA1) and the web of trust
ciphertext
block cipher
PG
TKIP
27. Sequence of bits used in encryption and decryption - also known as cryptovariable
key
AES
TLS
TPM
28. Provides digests in different lengths including 224 - 256 - 384 - and 512
SHA-2
whole disk encryption
tunneling
ciphertext
29. Process of transforming plaintext into unreadable format
encryption
AES
HTTPS
WPA2
30. A special mathematical function that peforms one way encryption - popular algorithms are SHA and MD - used to verify message/file integrity and passwords
non repudiation
hashing
tunneling protocols
TKIP
31. Selected by NIST for cryptographic hash functions for public use - 160 bit length
tunneling protocols
key
MD5
SHA
32. Password storage hash for Windows systems after XP - uses MD4 and full unicode character set
NTLM
hybrid cryptosystem
secure hash algorithms
DES
33. Cryptographic algorithm that operates on plaintext - one bit at a time - and enciphers with a random generated "key stream" using substitution
WPA2
stream cipher
confidentiality
block cipher
34. Tunneling protocol originally used on UNIX - uses port 22 - typically used for remote administration - replaces telnet and FTP
SSH
non repudiation
PPTP
tunneling
35. Common tunneling protocol integrated in Windows - works well with NAT - maybe blocked at firewall
symmetric key algorithms
hybrid
L2TP
PPTP
36. Developed to replace DES based on Rijndael variable block cipher - has a fixed block length and key lengths: 128 - 192 - or 256 bits
four modes of DES
AES
IPSec
non repudiation
37. SHA-1 - MD2/ MD4 - MD5 - Fasthash - Triple DES-MAC - Tiger - and RIPEMD-160
plaintext
S-HTTP
secure hash algorithms
Hash Message Authentication Code
38. Most efficient algorithm - used for smart cards and cell phones - provides digital signatures - secure key exchange - and encryption
MD5
elliptic curve
PPTP
asymmetric key
39. Block and stream
symmetric ciphers
PPTP
DES
S-HTTP
40. Protects against removing or installing a bogus hard drive using sealing (measuring system variables - BIOS - boot sector - firmware)
block cipher
encryption
TPM
PPTP
41. Asymmetric cryptography - hashes - and digital signatures provide __________
elliptic curve
cryptography
asymmetric key algorithms
non repudiation
42. An internet email standard format specifying how multimedia and attachments are handled
steganography
MIME
lanman
decryption
43. PGP and SSH
hybrid
X.509
PPTP
SHA
44. Digital signature standard that uses 2 algorithms: RSA and DSA (based on El Gamal) - both use the Secure Hash Standard (SHA-1)
DSS
tunneling protocols
integrity
steganography
45. Allow client/server applcation to communicate in a secure manner across a network - TLS stands for
transport layer security
SHA
hybrid
integrity
46. For encrypting web communications - uses Cryptographic Messaging Syntax (CMS) to protect individual message and response
MD5
hybrid cryptosystem
S-HTTP
symmetric key
47. Based on two keys - public and private - one-way function: a key cannot decrypt what it encrypts - provides confidentiality - authentication - integrity - and nonrepudiation - Discovered by Diffie and Hellman - also known as public key
Hash Message Authentication Code
asymmetric key
PG
NTLM
48. Encryption standard broken in 1998 - has a relatively short key length
PG
TPM
DES
symmetric ciphers
49. PPTP - L2TP - IPSec - and SSH
symmetric key algorithms
MIME
tunneling protocols
cryptanalysis
50. PKI standard
hashing
S/MIME
X.509
trusted platform module
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests