CISSP Cryptography Practice Test

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Cindymurray
C
Cindymurray
Community Contributor
Quizzes Created: 8 | Total Attempts: 15,187
| Attempts: 9,336 | Questions: 17
Please wait...
Question 1 / 17
0 %
0/100
Score 0/100
1. Messages protected by steganography can be transmitted to

Explanation

Steganography is the practice of hiding messages within other files to ensure secrecy. It involves embedding the message within the data of another file, such as a picture, music, or video file. This allows the message to be transmitted without arousing suspicion. Therefore, all of the above options are correct as they can be used to transmit messages protected by steganography.

Submit
Please wait...
About This Quiz
CISSP Cryptography Practice Test - Quiz

Are you looking for some good practice test questions and answers on CISSP cryptography? Then, you've arrived at the right place. In this test, we will be asking... see moreyou questions related to cryptography and its related concepts. You have to choose the correct option for every given question. Do you think you can pass this test? Let's start the quiz and see how well you score. So, are you ready? Let's get started then. see less

2. What is an important disadvantage of using a public key algorithm compared to a symmetric algorithm?

Explanation

Using a public key algorithm is slower compared to a symmetric algorithm. Public key algorithms involve complex mathematical calculations and require more computational resources, making them slower in processing data. On the other hand, symmetric algorithms use a single key for both encryption and decryption, resulting in faster processing times.

Submit
3. What is the output length of a RIPEMD-160 hash?

Explanation



Submit
4. The most common forms of asymmetric key cryptography include

Explanation

Diffie-Hellman is a widely used asymmetric key cryptography algorithm. It allows two parties to securely exchange cryptographic keys over an insecure channel. The algorithm is based on the mathematical problem of calculating discrete logarithms in a finite field. Diffie-Hellman provides a way for two parties to generate a shared secret key without actually transmitting it, making it resistant to eavesdropping attacks. It is commonly used in secure communication protocols such as SSL/TLS to establish secure connections between clients and servers.

Submit
5. When a certificate is revoked, what is the proper procedure?

Explanation



Submit
6. A certificate authority provides what benefits to a user?

Explanation



Submit
7. Asymmetric key cryptography is used for all of the following except:

Explanation

Asymmetric key cryptography is a method of encryption that uses two different keys, a public key and a private key, to encrypt and decrypt data. It is commonly used for encryption of data to ensure confidentiality and secure communication between parties. It can also be used for access control, where the private key is used to authenticate and grant access to authorized users. Additionally, asymmetric key cryptography can provide nonrepudiation, which means that the sender cannot deny sending a message as their private key is used to sign the message. However, steganography is a different technique that involves hiding information within other media, such as images or audio files, and does not directly involve encryption or asymmetric key cryptography.

Submit
8. The two methods of encrypting data are

Explanation



Submit
9. The only cipher system said to be unbreakable by brute force is

Explanation

The one-time pad is considered unbreakable by brute force because it uses a random key that is as long as the message itself. This key is never reused and is kept completely secret. Each character of the message is encrypted by combining it with the corresponding character of the key using a simple mathematical operation. Since the key is random and used only once, it provides perfect secrecy and makes it impossible for an attacker to determine the original message without knowing the key. In contrast, other cipher systems like AES, DES, and Triple DES can potentially be broken through brute force attacks or other cryptographic attacks.

Submit
10. ANSI X9.17 is concerned primarily with

Explanation



Submit
11. A way to defeat frequency analysis as a method to determine the key is to use

Explanation

Polyalphabetic ciphers use multiple alphabets or keys to encrypt the plaintext, making it more difficult for frequency analysis to determine the key. Unlike substitution ciphers, where each letter is replaced with a fixed substitution, polyalphabetic ciphers use different substitutions based on the position of the letter in the plaintext. This adds complexity and randomness to the encryption, making it harder to detect patterns and break the cipher using frequency analysis.

Submit
12. When a user needs to provide message integrity, what options may be best?

Explanation



Submit
13. A_________ is the sequence that controls the operation of the cryptographic algorithm.

Explanation



Submit
14. What is not true about link encryption?

Explanation

 


 
Submit
15. Cryptography supports all of the core principles of information security except

Explanation

Cryptography supports the core principles of information security, including availability, confidentiality, integrity, and authenticity. Availability ensures that information is accessible to authorized users when needed, while confidentiality ensures that information is protected from unauthorized access. Integrity ensures that information remains unaltered and accurate, while authenticity ensures that the source of the information can be verified. Therefore, the correct answer is authenticity.

Submit
16. Th e running key cipher is based on

Explanation

The running key cipher is based on modular arithmetic because it involves performing calculations within a finite set of numbers. In this encryption method, each letter of the plaintext is shifted by a corresponding letter from the running key, which is a repeating sequence of characters. The shift is determined by the position of the letters in the alphabet, and if the shift exceeds the number of letters in the alphabet, it wraps around using modular arithmetic. This ensures that the resulting ciphertext remains within the range of the alphabet.

Submit
17. The process used in most block ciphers to increase their strength is

Explanation



Submit
View My Results

Quiz Review Timeline (Updated): May 1, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • May 01, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 21, 2012
    Quiz Created by
    Cindymurray
Cancel
  • All
    All (17)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Messages protected by steganography can be transmitted to
What is an important disadvantage of using a public key algorithm...
What is the output length of a RIPEMD-160 hash?
The most common forms of asymmetric key cryptography include
When a certificate is revoked, what is the proper procedure?
A certificate authority provides what benefits to a user?
Asymmetric key cryptography is used for all of the following except:
The two methods of encrypting data are
The only cipher system said to be unbreakable by brute force is
ANSI X9.17 is concerned primarily with
A way to defeat frequency analysis as a method to determine the key is...
When a user needs to provide message integrity, what options may be...
A_________ is the sequence that controls the operation of the...
What is not true about link encryption?
Cryptography supports all of the core principles of information...
Th e running key cipher is based on
The process used in most block ciphers to increase their strength is
Alert!

Advertisement