Filters
Question type

Study Flashcards

Decryption is the process of creating ciphertext from plaintext.

A) True
B) False

Correct Answer

verifed

verified

The Vigenère cipher is a polyalphabetic substitution cipher.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is NOT a hashing algorithm


A) SHA1
B) MD2
C) SHA3
D) MD5

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

A collision attack is type of denial-of-service flooding attack that causes the number of collisions on the network to increase and thus bring down the network.

A) True
B) False

Correct Answer

verifed

verified

The art of secret writing that enables an individual to hide the contents of a message from all but the intended recipient is called


A) Steganography
B) Cryptanalysis
C) Cryptography
D) Key management

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

_______________ is a form of cryptography technology that can detect the interception of transmitted key bits.

Correct Answer

verifed

verified

Quantum Cr...

View Answer

Encrypting a message by simply rearranging the order of the letters is a function of the


A) Shift cipher
B) Substitution cipher
C) Transposition cipher
D) Vigenère cipher

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

C

All of the following are symmetric encryption algorithms EXCEPT:


A) ECC
B) Blowfish
C) AES
D) DES

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Hiding a text file in a jpg file is an example of steganography.

A) True
B) False

Correct Answer

verifed

verified

All of the following are asymmetric encryption algorithms EXCEPT:


A) RSA
B) 3DES
C) ECC
D) ElGamal

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

All of the following are cryptographic applications EXCEPT:


A) PGP
B) FreeOTFE
C) StegDetect
D) GnuPG

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

Bob connects to a company web site.His browser indicates that the digital certificate of the web site is valid.This application of encryption is an example of


A) Authentication
B) Nonrepudiation
C) Integrity
D) Confidentiality

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

_______________ puts the plaintext through a simplified cipher to try to deduce what the key is likely to be in a full version of the cipher.

Correct Answer

verifed

verified

Linear cry...

View Answer

Hashing functions are special mathematical functions that performs a two-way encryption.

A) True
B) False

Correct Answer

verifed

verified

The process for protecting intellectual property from unauthorized use is called _______________

Correct Answer

verifed

verified

digital rights management

DES,AES,RSA,and ECC are all examples of symmetric encryption.

A) True
B) False

Correct Answer

verifed

verified

The Vigenère cipher works as a


A) Asymmetric encryption cipher
B) Transposition and substitution cipher
C) Polyalphabetic transposition cipher
D) Polyalphabetic substitution cipher

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Explain two ways encryption was done in ancient times without computers.

Correct Answer

verifed

verified

The Spartans used a ribbon and cylinder and did a transposition cipher.The Romans used a shift cipher.

When a message sent by a user is digitally signed with a private key,the person will not be able to deny sending the message.This application of encryption is an example of


A) Authentication
B) Nonrepudiation
C) Confidentiality
D) Auditing

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

_______________ are functions that difficult to process without the key but easy to process when you have the key.

Correct Answer

verifed

verified

Showing 1 - 20 of 49

Related Exams

Show Answer