SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cryptography
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Sequence of bits used in encryption and decryption - also known as cryptovariable
key
plaintext
hashing
symmetric key
2. Encryption standard broken in 1998 - has a relatively short key length
DES
trusted platform module
TKIP
symmetric key algorithms
3. SHA-1 - MD2/ MD4 - MD5 - Fasthash - Triple DES-MAC - Tiger - and RIPEMD-160
SHA-2
secure hash algorithms
stream cipher
DSS
4. PPTP - L2TP - IPSec - and SSH
hybrid cryptosystem
secure hash algorithm
secure hash algorithms
tunneling protocols
5. An algorithm developed to secure wireless - improperly implemented RC4 - only had a 40 bit key
wired equivalency privacy
hybrid
cryptography
IPSec
6. Encrypting a message's hash value with a private key - DOES NOT ensure confidentiality
ciphertext
plaintext
symmetric key algorithms
digital signature
7. Altering the form of a message to disguise its meaning
cryptography
steganography
AES
DES
8. Used by WPA - uses RC4 with IV - blocks replay attacks with packet sequence counter - replaced by WPA2
TKIP
cryptography
cipher
integrity
9. Free email security program that uses several algorithms - symmetric (IDEA) - asymmetric (RSA) and hashes (SHA1) and the web of trust
PG
SSH
key
elliptic curve
10. Based on use of one private/secret key - does NOT provide authentication or nonrepudiation - uses MAC
symmetric key
Hash Message Authentication Code
digital signature
SHA-2
11. Based on two keys - public and private - one-way function: a key cannot decrypt what it encrypts - provides confidentiality - authentication - integrity - and nonrepudiation - Discovered by Diffie and Hellman - also known as public key
wired equivalency privacy
asymmetric key
key
Message Authentication Code
12. Developed to strengthen DES - uses 3 keys (key clustering) to encrypt 3 times
confidentiality
triple DES
decryption
cryptanalysis
13. Selected by NIST for cryptographic hash functions for public use - 160 bit length
non repudiation
SHA
PPTP
SSH
14. Method of encryption and decryption
AES
integrity
trusted platform module
cipher
15. Sender/receiver share the same key - fast - provides confidentiality - key management issue
whole disk encryption
encryption
symmetric key
TKIP
16. Cryptographic algorithm that operates on plaintext - one bit at a time - and enciphers with a random generated "key stream" using substitution
elliptic curve
stream cipher
whole disk encryption
trusted platform module
17. Provides digests in different lengths including 224 - 256 - 384 - and 512
SHA-2
MIME
block cipher
collision
18. Runs on top of TLS on port 443 - protected against MITM attacks and creates secure connections
HTTPS
wired equivalency privacy
PPTP
asymmetric key
19. Enciphers fixed-size blocks of bits using substitution and permutation
MIME
block cipher
hybrid
IPSec
20. A cryptographic protocol that provides security for communications over networks such as the Internet - more secure that SSL
TLS
elliptic curve
triple DES
Hash Message Authentication Code
21. Asymmetric cryptography - hashes - and digital signatures provide __________
non repudiation
elliptic curve
transport layer security
AES
22. Has a transport and tunnel mode - tunnel mode is used to create VPN connections
secure hash algorithms
IPSec
tunneling protocols
PPTP
23. Digital signature standard that uses 2 algorithms: RSA and DSA (based on El Gamal) - both use the Secure Hash Standard (SHA-1)
DSS
IPSec
lanman
DES
24. A protocol suite for securing network connections using IKE - AH - and ESP
S-HTTP
IPSec
secure hash algorithm
hybrid
25. Symmetric cryptography with MAC - asymmetric cryptography - and hashes provide __________
ciphertext
trusted platform module
S/MIME
integrity
26. Password storage hash for Windows systems after XP - uses MD4 and full unicode character set
MIME
HTTPS
NTLM
collision
27. Data encryption standard derived from IBM Lucifer algorithm - 56-bit key - 64-bit block - uses the Data Encryption Algorithm (DEA)
SHA-2
DES
symmetric key
cipher
28. A secure cryptoprocessor embedded in the motherboard used to authenticate a hardware device - TPM stands for
NTLM
trusted platform module
RSA
MIME
29. AES Encryption standard used to protect sensitive but ________ - default key 128
AES
whole disk encryption
unclassified data
SSH
30. Block and stream
IPSec
symmetric ciphers
steganography
tunneling
31. Tunneling protocol that merges PPTP with L2F - using port 1701 - is used over UDP - can be combined with IPSec for 5 layered encapsulation
elliptic curve
L2TP
DES
integrity
32. Symmetric cryptography - asymmetric cryptography - and hashes provide __________
tunneling
L2TP
confidentiality
encryption
33. Protects against removing or installing a bogus hard drive using sealing (measuring system variables - BIOS - boot sector - firmware)
PG
TKIP
TPM
transport layer security
34. PGP and SSH
triple DES
TKIP
SHA-2
hybrid
35. A special mathematical function that peforms one way encryption - popular algorithms are SHA and MD - used to verify message/file integrity and passwords
PG
asymmetric key algorithms
TKIP
hashing
36. Discovering the original message using other than normal means (i.e. "breaking" the cryptosystem)
X.509
cryptanalysis
cipher
digital signature
37. Security enhancement for MIME - provides signed (SHA-1) and encrypted (RSA and Diffe-Helman) email messasges
SHA
four modes of DES
cryptanalysis
S/MIME
38. Encrypting all data on a disk using common algorithms (AES) - requires a key (passpharse - USB key) in memory to decrypt disk
whole disk encryption
triple DES
stream cipher
X.509
39. Process of transforming plaintext into unreadable format
encryption
transport layer security
X.509
trusted platform module
40. Uses symmetric key for integrity and confidentiality (bulk transaction) and asymmetric key for authentication - nonrepudiation - and key exchange
SHA-2
hybrid cryptosystem
DES
symmetric ciphers
41. Two different pieces of data have the same hash value
DSS
integrity
collision
asymmetric key
42. An algorithm developed to secure wireless that uses AES (CCMP + AES)
integrity
WPA2
TPM
MD5
43. Password storage hash for Windows XP - separates password into two 7 character parts and converts to upper case
cipher
hybrid cryptosystem
secure hash algorithm
lanman
44. Provides integrity - authentication - and non-repudiation by encrypting a message digest with a private key
unclassified data
WPA2
HTTPS
digital signature
45. A cryptographic communications protocol at the transport layer that provides public key encryption (RSA or Diffie-Helman) - data encryption (IDEA - DES - 3DES) - server authentication - message integrity (MD5 or SHA-1) - and client authentication.
HTTPS
cryptanalysis
secure hash algorithms
SSL
46. Common tunneling protocol integrated in Windows - works well with NAT - maybe blocked at firewall
PPTP
SHA
SHA-2
whole disk encryption
47. Tunneling protocol originally used on UNIX - uses port 22 - typically used for remote administration - replaces telnet and FTP
secure hash algorithm
SSH
DES
wired equivalency privacy
48. Most widely used asymmetric algorithm - used for digital signatures - key exchange - and encryption
RSA
tunneling protocols
symmetric ciphers
decryption
49. RSA - Diffie and Hellman - Elliptic Curve (EC) - DSS (Digital Signature Standard) - El Gamal - Merkel-Hellman
asymmetric key algorithms
tunneling
WPA2
steganography
50. Art of hiding communications - i.e. hide information in graphic files - sound files - or slack space.
DES
steganography
wired equivalency privacy
secure hash algorithms