SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cryptography
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. HMAC stands for...
hybrid cryptosystem
hybrid
Hash Message Authentication Code
non repudiation
2. Has a transport and tunnel mode - tunnel mode is used to create VPN connections
lanman
steganography
IPSec
HMAC
3. Sender/receiver share the same key - fast - provides confidentiality - key management issue
transport layer security
symmetric key
encryption
S/MIME
4. Enciphers fixed-size blocks of bits using substitution and permutation
block cipher
one time pad
TKIP
MIME
5. A cryptographic communications protocol at the transport layer that provides public key encryption (RSA or Diffie-Helman) - data encryption (IDEA - DES - 3DES) - server authentication - message integrity (MD5 or SHA-1) - and client authentication.
key
asymmetric key algorithms
SSL
symmetric key algorithms
6. Provides digests in different lengths including 224 - 256 - 384 - and 512
TPM
SHA-2
AES
DES
7. Most widely used tunneling protocol - over port 1723 - data carried in an IP tunnel over Generic Routing Encapsulation (GRE)
PPTP
DSS
SHA
Hash Message Authentication Code
8. Cipher block chaining (CBC) - cipher feedback (CFB) - electronic code book (ECB) and output feedback (OFB)
non repudiation
cryptography
symmetric key
four modes of DES
9. An internet email standard format specifying how multimedia and attachments are handled
SHA-2
WPA2
MIME
digital signature
10. A protocol suite for securing network connections using IKE - AH - and ESP
HTTPS
IPSec
Message Authentication Code
symmetric key
11. Encryption standard broken in 1998 - has a relatively short key length
DES
TKIP
wired equivalency privacy
decryption
12. Based on use of one private/secret key - does NOT provide authentication or nonrepudiation - uses MAC
wired equivalency privacy
TPM
DES
symmetric key
13. PPTP - L2TP - IPSec - and SSH
encryption
tunneling protocols
cryptanalysis
secure hash algorithm
14. RSA - Diffie and Hellman - Elliptic Curve (EC) - DSS (Digital Signature Standard) - El Gamal - Merkel-Hellman
secure hash algorithms
transport layer security
hashing
asymmetric key algorithms
15. Common tunneling protocol integrated in Windows - works well with NAT - maybe blocked at firewall
PPTP
encryption
TLS
digital signature
16. Developed to replace DES based on Rijndael variable block cipher - has a fixed block length and key lengths: 128 - 192 - or 256 bits
asymmetric key algorithms
cipher
IPSec
AES
17. A cryptographic protocol that provides security for communications over networks such as the Internet - more secure that SSL
MIME
elliptic curve
DES
TLS
18. Mechanism for message authentication that uses one of two algorithms (SHA-1 or MDF5) in combination with a shared secret key - also known as keyed hashing
HMAC
decryption
PPTP
encryption
19. Encrypting all data on a disk using common algorithms (AES) - requires a key (passpharse - USB key) in memory to decrypt disk
secure hash algorithm
one time pad
hashing
whole disk encryption
20. Encrypting a message's hash value with a private key - DOES NOT ensure confidentiality
one time pad
confidentiality
digital signature
lanman
21. Free email security program that uses several algorithms - symmetric (IDEA) - asymmetric (RSA) and hashes (SHA1) and the web of trust
tunneling
PG
X.509
DES
22. Data encryption standard derived from IBM Lucifer algorithm - 56-bit key - 64-bit block - uses the Data Encryption Algorithm (DEA)
DES
Hash Message Authentication Code
non repudiation
PPTP
23. Art of hiding communications - i.e. hide information in graphic files - sound files - or slack space.
digital signature
steganography
trusted platform module
elliptic curve
24. Uses symmetric key for integrity and confidentiality (bulk transaction) and asymmetric key for authentication - nonrepudiation - and key exchange
hybrid cryptosystem
tunneling
S/MIME
decryption
25. Provides integrity - authentication - and non-repudiation by encrypting a message digest with a private key
ciphertext
plaintext
AES
digital signature
26. Password storage hash for Windows XP - separates password into two 7 character parts and converts to upper case
tunneling protocols
lanman
SSL
hybrid
27. Runs on top of TLS on port 443 - protected against MITM attacks and creates secure connections
HTTPS
wired equivalency privacy
Hash Message Authentication Code
L2TP
28. Two different pieces of data have the same hash value
cryptanalysis
TPM
collision
cipher
29. Password storage hash for Windows systems after XP - uses MD4 and full unicode character set
NTLM
non repudiation
X.509
IPSec
30. Altering the form of a message to disguise its meaning
asymmetric key algorithms
encryption
TKIP
cryptography
31. Symmetric cryptography - asymmetric cryptography - and hashes provide __________
symmetric key
confidentiality
wired equivalency privacy
SHA
32. Discovering the original message using other than normal means (i.e. "breaking" the cryptosystem)
digital signature
cryptanalysis
WPA2
cipher
33. Pads messages to a length of 512 bits - then compresses to generate a 128 bit hash value
non repudiation
MD5
TLS
secure hash algorithm
34. A secure cryptoprocessor embedded in the motherboard used to authenticate a hardware device - TPM stands for
SSH
trusted platform module
encryption
asymmetric key
35. Most widely used asymmetric algorithm - used for digital signatures - key exchange - and encryption
RSA
triple DES
SSL
integrity
36. AES Encryption standard used to protect sensitive but ________ - default key 128
unclassified data
lanman
WPA2
DSS
37. Impossible to find a message - given only message digest - impossible to find 2 messages that produce the same message digest
IPSec
ciphertext
non repudiation
secure hash algorithm
38. A cryptographic checksum used to provide integrity in symmetric key cryptography
confidentiality
secure hash algorithms
Message Authentication Code
tunneling protocols
39. Used by WPA - uses RC4 with IV - blocks replay attacks with packet sequence counter - replaced by WPA2
TKIP
SSH
secure hash algorithms
HMAC
40. For encrypting web communications - uses Cryptographic Messaging Syntax (CMS) to protect individual message and response
S-HTTP
digital signature
SHA
asymmetric key
41. PGP and SSH
cryptanalysis
collision
hybrid cryptosystem
hybrid
42. Tunneling protocol that merges PPTP with L2F - using port 1701 - is used over UDP - can be combined with IPSec for 5 layered encapsulation
cryptography
whole disk encryption
L2TP
symmetric key algorithms
43. Protects against removing or installing a bogus hard drive using sealing (measuring system variables - BIOS - boot sector - firmware)
TPM
block cipher
TLS
hybrid
44. Asymmetric cryptography - hashes - and digital signatures provide __________
TPM
PPTP
non repudiation
DES
45. Technique of encapsulating one packet of data within another type to create a secure link of transportation
tunneling
SSH
WPA2
whole disk encryption
46. Unencrypted text - also called cleartext
PPTP
digital signature
plaintext
encryption
47. DES - 3DES - AES - Twofish - Blowfish - IDEA - Skipjack - RC2 -RC4 - RC5 - RC6
encryption
symmetric key algorithms
PPTP
SHA-2
48. Sequence of bits used in encryption and decryption - also known as cryptovariable
TLS
key
TPM
DES
49. Process of transforming plaintext into unreadable format
S-HTTP
encryption
PPTP
ciphertext
50. Process of transforming ciphertext into plaintext (decipherment)
key
encryption
decryption
confidentiality