CISSP Crypto Domain MCQs

CISSP Crypto Domain MCQs

The following CISSP Crypto Domain MCQs have been compiled by our experts through research, in order to test your knowledge of the subject of CISSP Crypto Domain. We encourage you to answer these 20 multiple-choice questions to assess your proficiency.
Please continue by scrolling down.

1: Function that takes a variable length string; and compresses and transforms it into a fixed length- output called a hash or message digest

A.   Stream Cipher

B.   Hashing algorithm

C.   IDEA

D.   Zero knowledge proof

2: MD5 - SHA1

A.   Substitution cipher

B.   DES CFB

C.   PKI

D.   Common Hash Algorithms

3: Spartans - wrapped around rod.

A.   Initialization vector/salt

B.   DES CTR

C.   Symetric synonyms

D.   Scytale

4: Rearrances the bits characters or character blocks

A.   RSA

B.   Link encryption

C.   Public Key Infrastructure

D.   Transposition/permutation cipher

5: Authentication and integrity - needed when... At rest and in transit.

A.   Modular mathematics

B.   DES OFB

C.   Key clustering

D.   Signature

6: 48 rounds - 2 or 3 keys - enc enc enc (EEE) - or enc dec enc (EDE)

A.   Substitution cipher

B.   HAVAL

C.   Prime factorization

D.   3DES

7: Mathematical operation performed several times on the same message block

A.   Symmetric algorithms types

B.   Steganography

C.   Rounds

D.   Message hashing

8: Buries a message by taking the least significant bit of evvery byte to carry the message; hide a message in another message. Graphics; sound files; alternated used in corporate espionage

A.   Wassenaar arrangement

B.   OCSP

C.   Blowfish

D.   Steganography

9: Encryption - decryption - signing - verifying

A.   Brute force attack on hashing

B.   Link encryption

C.   Asymmetric uses

D.   DES CFB

10: A specific proceedure

A.   Algorithm

B.   Digital signatures

C.   Vernam cipher

D.   Historical highlights

11: 1996 - crypto is protected in agreement.

A.   Link encryption

B.   RSA

C.   Wassenaar arrangement

D.   Stream Cipher

12: Data Encryption Standard (DES) 5 Block Modes; Trple DES runs through it three times; Blowfish; IDEA; RC4; RC5

A.   DES OFB

B.   Steganography

C.   Cryptovariable

D.   Symmetric algorithms types

13: Advanced Encryption Standard

A.   Output Feedback Mode

B.   RiJndael(AES)

C.   CAST

D.   Key mgmt mechanisms

14: Public Key Infrastructure- Developed to provide standards for key generation; authentication; x.509 non used with Pretty Good Privacy; good private good "web of trust"

A.   Message hashing

B.   PKI

C.   IDEA

D.   Zero knowledge proof

15: Caesar cipher - scytale - Blaise de vigenere - vernam cipher

A.   Lucifer

B.   Hybrid encrypt features

C.   RiJndael(AES)

D.   Historical highlights

16: Stream based - errors do not propagate across blocks

A.   Output Feedback Mode

B.   One time pad

C.   Digital Signature Standard

D.   IDEA

17: Key storage;escrow;archival;recovery agend;multiple key pairs

A.   Symmetric Crypto

B.   HMAC

C.   Key mgmt tasks

D.   Vernam cipher

18: No plaintext exposure; encrypted at source; VPN; SSL ;SSH

A.   Rivest Cipher

B.   End to end enccryption

C.   Certificate practice statement

D.   Concealment cipher

19: International Data Encryption Algorithm- operateson 64 bit blocks-uses 128 bit key and is faster than DES; used in PGP and other software; no successful attacks

A.   Certificate practice statement

B.   Symmetric Algorithms

C.   IDEA

D.   Confusion

20: One key - only confidentiality

A.   Work factor

B.   AES

C.   Diffie-Hellman Algorithm

D.   Symmetric

21: CIA plus non repudiation

A.   Crypto services

B.   Diffe Helman

C.   One time pad

D.   REED D asym algorithms

22: Hides data in images - usually by LSB (least significant bit)

A.   Wassenaar arrangement

B.   Steganography

C.   AES

D.   Asymmetric Enc provides

23: Hardware - software - and policies (security association) -

A.   Public Key Infrastructure

B.   REED D asym algorithms

C.   Signature

D.   Signature

24: Attmpts to conceal data by hiding it; Used by placing information in objectssuch as graphics; sound files or document headers

A.   Digital signatures

B.   Symmetric Crypto

C.   Initialization vector/salt

D.   Steganography

25: RSA; El Gamal; ECC; Diffe Hellman; DSA

A.   Rounds

B.   REED D asym algorithms

C.   Symmetric Algorithms

D.   Initialization vector/salt

26: Symmetric for Bulk Encrypt; assym for key encapsulation- used in SSL; Email; key exchange

A.   Rivest Cipher

B.   Hybrid encrypt features

C.   Symmetric algorithms types

D.   Diffe Helman

27: Hash Mess Auth Code (512bit MD5; SHA-1); calculated using a hash function with secret key- shared key appended to data shared faster than DES CBC- used in IPSEC SSL/TLS and SSH

A.   Ciphertext

B.   HMAC

C.   Symmetric algorithms types

D.   Frequency analysis

28: Uses asymmetric to figure out a key - symmetric used for large data encryption.

A.   Polyalphabetic

B.   Hybrid Encryption

C.   Hash Function Uses

D.   Signature