The following CISSP Crypto Domain MCQs have been compiled by our experts through research, in order to test your knowledge of the subject of CISSP Crypto Domain. We encourage you to answer these 20 multiple-choice questions to assess your proficiency.

Please continue by scrolling down.

A. Stream Cipher

B. Hashing algorithm

C. IDEA

D. Zero knowledge proof

A. Substitution cipher

B. DES CFB

C. PKI

D. Common Hash Algorithms

A. Initialization vector/salt

B. DES CTR

C. Symetric synonyms

D. Scytale

A. RSA

B. Link encryption

C. Public Key Infrastructure

D. Transposition/permutation cipher

A. Modular mathematics

B. DES OFB

C. Key clustering

D. Signature

A. Substitution cipher

B. HAVAL

C. Prime factorization

D. 3DES

A. Symmetric algorithms types

B. Steganography

C. Rounds

D. Message hashing

A. Wassenaar arrangement

B. OCSP

C. Blowfish

D. Steganography

A. Brute force attack on hashing

B. Link encryption

C. Asymmetric uses

D. DES CFB

A. Algorithm

B. Digital signatures

C. Vernam cipher

D. Historical highlights

A. Link encryption

B. RSA

C. Wassenaar arrangement

D. Stream Cipher

A. DES OFB

B. Steganography

C. Cryptovariable

D. Symmetric algorithms types

A. Output Feedback Mode

B. RiJndael(AES)

C. CAST

D. Key mgmt mechanisms

A. Message hashing

B. PKI

C. IDEA

D. Zero knowledge proof

A. Lucifer

B. Hybrid encrypt features

C. RiJndael(AES)

D. Historical highlights

A. Output Feedback Mode

B. One time pad

C. Digital Signature Standard

D. IDEA

A. Symmetric Crypto

B. HMAC

C. Key mgmt tasks

D. Vernam cipher

A. Rivest Cipher

B. End to end enccryption

C. Certificate practice statement

D. Concealment cipher

A. Certificate practice statement

B. Symmetric Algorithms

C. IDEA

D. Confusion

A. Work factor

B. AES

C. Diffie-Hellman Algorithm

D. Symmetric

A. Crypto services

B. Diffe Helman

C. One time pad

D. REED D asym algorithms

A. Wassenaar arrangement

B. Steganography

C. AES

D. Asymmetric Enc provides

A. Public Key Infrastructure

B. REED D asym algorithms

C. Signature

D. Signature

A. Digital signatures

B. Symmetric Crypto

C. Initialization vector/salt

D. Steganography

A. Rounds

B. REED D asym algorithms

C. Symmetric Algorithms

D. Initialization vector/salt

A. Rivest Cipher

B. Hybrid encrypt features

C. Symmetric algorithms types

D. Diffe Helman

A. Ciphertext

B. HMAC

C. Symmetric algorithms types

D. Frequency analysis

A. Polyalphabetic

B. Hybrid Encryption

C. Hash Function Uses

D. Signature