SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cryptography
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. PPTP - L2TP - IPSec - and SSH
tunneling protocols
DES
symmetric key
digital signature
2. Encrypting a message's hash value with a private key - DOES NOT ensure confidentiality
transport layer security
symmetric key
asymmetric key
digital signature
3. Based on use of one private/secret key - does NOT provide authentication or nonrepudiation - uses MAC
AES
symmetric key
IPSec
TPM
4. DES - 3DES - AES - Twofish - Blowfish - IDEA - Skipjack - RC2 -RC4 - RC5 - RC6
symmetric key
symmetric key algorithms
unclassified data
S/MIME
5. Password storage hash for Windows systems after XP - uses MD4 and full unicode character set
trusted platform module
hybrid
wired equivalency privacy
NTLM
6. Used by WPA - uses RC4 with IV - blocks replay attacks with packet sequence counter - replaced by WPA2
MD5
Hash Message Authentication Code
IPSec
TKIP
7. Method of encryption and decryption
wired equivalency privacy
SHA-2
HTTPS
cipher
8. Most widely used asymmetric algorithm - used for digital signatures - key exchange - and encryption
PPTP
RSA
HMAC
L2TP
9. Impossible to find a message - given only message digest - impossible to find 2 messages that produce the same message digest
L2TP
key
symmetric key algorithms
secure hash algorithm
10. Cipher block chaining (CBC) - cipher feedback (CFB) - electronic code book (ECB) and output feedback (OFB)
unclassified data
cryptography
S-HTTP
four modes of DES
11. Encrypting all data on a disk using common algorithms (AES) - requires a key (passpharse - USB key) in memory to decrypt disk
S-HTTP
triple DES
whole disk encryption
digital signature
12. Has a transport and tunnel mode - tunnel mode is used to create VPN connections
HTTPS
SHA-2
IPSec
L2TP
13. Symmetric cryptography with MAC - asymmetric cryptography - and hashes provide __________
confidentiality
integrity
symmetric key
tunneling
14. Most widely used tunneling protocol - over port 1723 - data carried in an IP tunnel over Generic Routing Encapsulation (GRE)
DES
PPTP
digital signature
elliptic curve
15. Provides digests in different lengths including 224 - 256 - 384 - and 512
asymmetric key
DSS
SHA-2
X.509
16. Sender/receiver share the same key - fast - provides confidentiality - key management issue
elliptic curve
one time pad
trusted platform module
symmetric key
17. An algorithm developed to secure wireless - improperly implemented RC4 - only had a 40 bit key
wired equivalency privacy
confidentiality
SSH
TPM
18. Pads messages to a length of 512 bits - then compresses to generate a 128 bit hash value
four modes of DES
stream cipher
SHA-2
MD5
19. A protocol suite for securing network connections using IKE - AH - and ESP
SHA-2
IPSec
DES
plaintext
20. Encryption standard broken in 1998 - has a relatively short key length
asymmetric key algorithms
tunneling protocols
SSL
DES
21. Art of hiding communications - i.e. hide information in graphic files - sound files - or slack space.
IPSec
decryption
non repudiation
steganography
22. Most efficient algorithm - used for smart cards and cell phones - provides digital signatures - secure key exchange - and encryption
AES
hashing
elliptic curve
trusted platform module
23. Password storage hash for Windows XP - separates password into two 7 character parts and converts to upper case
SSL
symmetric key algorithms
TPM
lanman
24. Developed to strengthen DES - uses 3 keys (key clustering) to encrypt 3 times
hybrid cryptosystem
triple DES
SHA-2
IPSec
25. Allow client/server applcation to communicate in a secure manner across a network - TLS stands for
ciphertext
transport layer security
hybrid cryptosystem
secure hash algorithm
26. The cipher considered unbreakable in practice - uses XOR - also called the Vernam cipher
L2TP
RSA
one time pad
unclassified data
27. For encrypting web communications - uses Cryptographic Messaging Syntax (CMS) to protect individual message and response
tunneling
S-HTTP
secure hash algorithm
SSL
28. Based on two keys - public and private - one-way function: a key cannot decrypt what it encrypts - provides confidentiality - authentication - integrity - and nonrepudiation - Discovered by Diffie and Hellman - also known as public key
block cipher
SHA-2
asymmetric key
tunneling
29. Asymmetric cryptography - hashes - and digital signatures provide __________
SHA-2
IPSec
non repudiation
stream cipher
30. Discovering the original message using other than normal means (i.e. "breaking" the cryptosystem)
non repudiation
SSH
transport layer security
cryptanalysis
31. RSA - Diffie and Hellman - Elliptic Curve (EC) - DSS (Digital Signature Standard) - El Gamal - Merkel-Hellman
PG
secure hash algorithms
transport layer security
asymmetric key algorithms
32. Runs on top of TLS on port 443 - protected against MITM attacks and creates secure connections
HTTPS
X.509
RSA
IPSec
33. Symmetric cryptography - asymmetric cryptography - and hashes provide __________
confidentiality
DES
tunneling protocols
MD5
34. Free email security program that uses several algorithms - symmetric (IDEA) - asymmetric (RSA) and hashes (SHA1) and the web of trust
PG
decryption
unclassified data
transport layer security
35. Enciphers fixed-size blocks of bits using substitution and permutation
block cipher
PPTP
steganography
stream cipher
36. A special mathematical function that peforms one way encryption - popular algorithms are SHA and MD - used to verify message/file integrity and passwords
four modes of DES
hashing
digital signature
SHA
37. Developed to replace DES based on Rijndael variable block cipher - has a fixed block length and key lengths: 128 - 192 - or 256 bits
ciphertext
integrity
AES
hashing
38. An algorithm developed to secure wireless that uses AES (CCMP + AES)
tunneling
PPTP
WPA2
Hash Message Authentication Code
39. Selected by NIST for cryptographic hash functions for public use - 160 bit length
SHA
symmetric key
HMAC
secure hash algorithm
40. PKI standard
symmetric ciphers
non repudiation
X.509
TPM
41. A secure cryptoprocessor embedded in the motherboard used to authenticate a hardware device - TPM stands for
trusted platform module
tunneling protocols
four modes of DES
DSS
42. Technique of encapsulating one packet of data within another type to create a secure link of transportation
TPM
non repudiation
tunneling
four modes of DES
43. Two different pieces of data have the same hash value
wired equivalency privacy
MD5
collision
ciphertext
44. Sequence of bits used in encryption and decryption - also known as cryptovariable
secure hash algorithm
PG
plaintext
key
45. Protects against removing or installing a bogus hard drive using sealing (measuring system variables - BIOS - boot sector - firmware)
RSA
plaintext
TPM
PG
46. A cryptographic communications protocol at the transport layer that provides public key encryption (RSA or Diffie-Helman) - data encryption (IDEA - DES - 3DES) - server authentication - message integrity (MD5 or SHA-1) - and client authentication.
ciphertext
triple DES
SSL
digital signature
47. A cryptographic protocol that provides security for communications over networks such as the Internet - more secure that SSL
cryptography
TLS
digital signature
MIME
48. A cryptographic checksum used to provide integrity in symmetric key cryptography
digital signature
triple DES
IPSec
Message Authentication Code
49. Uses symmetric key for integrity and confidentiality (bulk transaction) and asymmetric key for authentication - nonrepudiation - and key exchange
hybrid cryptosystem
DES
TKIP
cryptography
50. Cryptographic algorithm that operates on plaintext - one bit at a time - and enciphers with a random generated "key stream" using substitution
decryption
asymmetric key algorithms
unclassified data
stream cipher