Bash, the Crucial Exams Chat Bot
AI Bot

ISC2 CISSP - Cryptography Fundamentals Flashcards

ISC2 CISSP Flashcards

Study our ISC2 CISSP - Cryptography Fundamentals flashcards for the ISC2 CISSP exam with 19+ flashcards. View as flashcards, a searchable table, or as a fun matching game.
ISC2 CISSP Course Header Image
FrontBack
Asymmetric encryption uses a pair of keys: a public key and a private key.True
In the encryption lifecyclewhat phase involves key generation?,Key Management
Symmetric encryption uses the same key for both encryption and decryption.True
What algorithm is commonly used for secure key exchange in asymmetric cryptography?Diffie-Hellman
What does AES stand for?Advanced Encryption Standard
What is a man-in-the-middle attack?An attack where the adversary secretly intercepts and possibly alters the communication between two parties
What is a nonce?A number used once to ensure freshness in cryptographic communication
What is digital signature used for?To ensure non-repudiation and data integrity
What is entropy in the context of cryptography?A measure of randomness or unpredictability in a key or system
What is public key infrastructure (PKI)?A framework of policies and services to create, manage, distribute, and revoke digital certificates
What is steganography?The practice of hiding messages within other non-secret text or data
What is the main difference between block ciphers and stream ciphers?Block ciphers encrypt fixed-size blocks of data, while stream ciphers encrypt data one bit or byte at a time
What is the primary goal of cryptography?To protect the confidentiality, integrity, and authenticity of information
What is the purpose of a cryptographic hash function?To produce a fixed-size unique representation of data
What is the purpose of an Initialization Vector (IV)?To ensure that the same plaintext encrypts to different ciphertexts each time
What is the role of a Certificate Authority (CA)?To issue digital certificates that authenticate the identity of entities
What protocol is widely used to secure web traffic?TLS (Transport Layer Security)
What protocol provides secure email communication?S/MIME (Secure/Multipurpose Internet Mail Extensions)
Which cipher mode combines the IV with the first plaintext block.CBC (Cipher Block Chaining)

About the Flashcards

Flashcards for the ISC2 CISSP exam provide focused review of core cryptography concepts and terminology. The deck covers the goals of cryptography (confidentiality, integrity, authenticity), symmetric and asymmetric systems, key algorithms such as AES and Diffie-Hellman, and the distinction between block and stream ciphers.

It reinforces cryptographic primitives and operational details-hash functions, nonces, IVs, entropy, and cipher modes like CBC-and covers applied topics including digital signatures, key management, PKI and Certificate Authorities, secure protocols such as TLS and S/MIME, steganography, and common attacks like man-in-the-middle. Ideal for reviewing terminology, concepts, and key ideas tested on the exam.

Topics covered in this flashcard deck:

  • Symmetric and asymmetric encryption
  • Cryptographic hash functions
  • Key management and PKI
  • Cipher modes and IVs
  • Protocols: TLS and S/MIME
  • Digital signatures and non-repudiation
Share on...
Follow us on...