Deck 11: Basic Cryptography

ملء الشاشة (f)
exit full mode
سؤال
A hash that is created from a set of data can be reversed.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
In MD5, the length of a message is padded to ____ bits.

A) 32
B) 64
C) 128
D) 512
سؤال
____ ensures that the information is correct and no unauthorized person or malicious software has altered that data.

A) Confidentiality
B) Availability
C) Encryption
D) Integrity
سؤال
The basis for a digital signature rests on the ability of ____ keys to work in both directions.

A) symmetric
B) shared
C) unique
D) asymmetric
سؤال
Symmetric encryption is also called ____ cryptography.

A) private key
B) public key
C) symmetric key
D) shared key
سؤال
The simplest type of stream cipher is a ____ cipher.

A) shift
B) substitution
C) lock
D) loop
سؤال
Cryptography cannot be applied to entire disks.
سؤال
____ is designed to replace DES.

A) AES
B) Twofish
C) 3DES
D) RSA
سؤال
The algorithm ____ is a block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits.

A) RSA
B) AES
C) Blowfish
D) 3DES
سؤال
One of the most famous ancient cryptographers was ____.

A) Albert Einstein
B) Isaac Newton
C) Julius Caesar
D) Caesar Augustus
سؤال
____ takes plaintext of any length and creates a hash 128 bits long.

A) RSA
B) SHA1
C) MD5
D) MD2
سؤال
____ is a relatively recent cryptographic hash function that has received international recognition and adoption by standards organizations, including the International Organization for Standardization (ISO).

A) Twofish
B) Blowfish
C) Whirlpool
D) Rijndal
سؤال
____ is text that has no formatting (such as bolding or underlining) applied.

A) Plaintext
B) Plain text
C) Simpletext
D) Simple text
سؤال
A ____ cipher rearranges letters without changing them.

A) substitution
B) block
C) loop
D) transposition
سؤال
____ encryption uses two keys instead of only one and these keys are mathematically related.

A) Symmetric
B) Asymmetric
C) Shared
D) Public key
سؤال
The____ is a symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES.

A) AES
B) 3DES
C) RSA
D) Twofish
سؤال
Self-encrypting HDD is commonly found in copiers and multifunction printers as well as point-of-sale systems used in government, financial, and medical environments.
سؤال
The most basic type of cryptographic algorithm is a ____ algorithm.

A) hash
B) key
C) digest
D) block
سؤال
Most HSMs are PAN-based appliances that can provide services to multiple devices.
سؤال
Steganography can use image files, audio files, or even video files to contain hidden information.
سؤال
The original cryptographic algorithms for encrypting and decrypting documents are ____________________ cryptographic algorithms.
سؤال
Explain hashing.
سؤال
____ attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys as well as to detect eavesdropping.

A) Reactive cryptography
B) Symmetric cryptography
C) Analog cryptography
D) Quantum cryptography
سؤال
DES is a(n) ____________________ cipher.
سؤال
Discuss how HMAC works.
سؤال
A ____ is a number divisible only by itself and 1.

A) prime number
B) prime decimal
C) compound number
D) neutral number
سؤال
A(n) ____________________ is a method used by operating systems to store, retrieve, and organize files.
سؤال
Describe how Message Digest2 (MD2) works.
سؤال
In information technology, ____________________ is the process of proving that a user performed an action, such as sending an e-mail message or a specific document.
سؤال
The ____ is essentially a chip on the motherboard of the computer that provides cryptographic services.

A) TPM
B) SCM
C) reference monitor
D) ODS
سؤال
Discuss how cryptography can help ensure the availability of the data.
سؤال
List and describe the characteristics a hashing algorithm must have to be considered secure.
سؤال
The ____ algorithm is the most common asymmetric cryptography algorithm and is the basis for several products.

A) AES
B) RSA
C) Twofish
D) Blowfish
سؤال
____ was first proposed in the mid-1980s and it uses sloping curves.

A) FCC
B) RSA
C) ECC
D) IKE
سؤال
Describe the RIPEMD hash.
سؤال
NTRUEncrypt uses ____ cryptography that relies on a set of points in space.

A) matrix-based
B) lattice-based
C) linear
D) quantum
سؤال
Describe how a block cipher works.
سؤال
Cleartext data that is to be encrypted is called ____________________.
سؤال
Describe the origins of cryptography.
سؤال
Describe the purpose and composition of Suite B.
سؤال
Describe hard disk drive encryption.
سؤال
Match between columns
Takes data, divides it into smaller sections, and hides it in unused portions of a file
Ciphertext
Takes data, divides it into smaller sections, and hides it in unused portions of a file
Cryptography
Takes data, divides it into smaller sections, and hides it in unused portions of a file
Steganography
Takes data, divides it into smaller sections, and hides it in unused portions of a file
Cleartext
Takes data, divides it into smaller sections, and hides it in unused portions of a file
Decryption
Takes data, divides it into smaller sections, and hides it in unused portions of a file
Key
Takes data, divides it into smaller sections, and hides it in unused portions of a file
GPG
Takes data, divides it into smaller sections, and hides it in unused portions of a file
PGP
Takes data, divides it into smaller sections, and hides it in unused portions of a file
EFS
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
Ciphertext
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
Cryptography
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
Steganography
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
Cleartext
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
Decryption
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
Key
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
GPG
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
PGP
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
EFS
To change the secret message back to its original form
Ciphertext
To change the secret message back to its original form
Cryptography
To change the secret message back to its original form
Steganography
To change the secret message back to its original form
Cleartext
To change the secret message back to its original form
Decryption
To change the secret message back to its original form
Key
To change the secret message back to its original form
GPG
To change the secret message back to its original form
PGP
To change the secret message back to its original form
EFS
Data that is in an unencrypted form
Ciphertext
Data that is in an unencrypted form
Cryptography
Data that is in an unencrypted form
Steganography
Data that is in an unencrypted form
Cleartext
Data that is in an unencrypted form
Decryption
Data that is in an unencrypted form
Key
Data that is in an unencrypted form
GPG
Data that is in an unencrypted form
PGP
Data that is in an unencrypted form
EFS
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
Ciphertext
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
Cryptography
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
Steganography
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
Cleartext
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
Decryption
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
Key
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
GPG
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
PGP
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
EFS
Versions run on Windows, UNIX, and Linux operating systems
Ciphertext
Versions run on Windows, UNIX, and Linux operating systems
Cryptography
Versions run on Windows, UNIX, and Linux operating systems
Steganography
Versions run on Windows, UNIX, and Linux operating systems
Cleartext
Versions run on Windows, UNIX, and Linux operating systems
Decryption
Versions run on Windows, UNIX, and Linux operating systems
Key
Versions run on Windows, UNIX, and Linux operating systems
GPG
Versions run on Windows, UNIX, and Linux operating systems
PGP
Versions run on Windows, UNIX, and Linux operating systems
EFS
A cryptography system for Windows operating systems that use the Windows NTFS file system.
Ciphertext
A cryptography system for Windows operating systems that use the Windows NTFS file system.
Cryptography
A cryptography system for Windows operating systems that use the Windows NTFS file system.
Steganography
A cryptography system for Windows operating systems that use the Windows NTFS file system.
Cleartext
A cryptography system for Windows operating systems that use the Windows NTFS file system.
Decryption
A cryptography system for Windows operating systems that use the Windows NTFS file system.
Key
A cryptography system for Windows operating systems that use the Windows NTFS file system.
GPG
A cryptography system for Windows operating systems that use the Windows NTFS file system.
PGP
A cryptography system for Windows operating systems that use the Windows NTFS file system.
EFS
A mathematical value entered into the algorithm to produce ciphertext
Ciphertext
A mathematical value entered into the algorithm to produce ciphertext
Cryptography
A mathematical value entered into the algorithm to produce ciphertext
Steganography
A mathematical value entered into the algorithm to produce ciphertext
Cleartext
A mathematical value entered into the algorithm to produce ciphertext
Decryption
A mathematical value entered into the algorithm to produce ciphertext
Key
A mathematical value entered into the algorithm to produce ciphertext
GPG
A mathematical value entered into the algorithm to produce ciphertext
PGP
A mathematical value entered into the algorithm to produce ciphertext
EFS
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Basic Cryptography
1
A hash that is created from a set of data can be reversed.
False
2
In MD5, the length of a message is padded to ____ bits.

A) 32
B) 64
C) 128
D) 512
D
3
____ ensures that the information is correct and no unauthorized person or malicious software has altered that data.

A) Confidentiality
B) Availability
C) Encryption
D) Integrity
D
4
The basis for a digital signature rests on the ability of ____ keys to work in both directions.

A) symmetric
B) shared
C) unique
D) asymmetric
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
Symmetric encryption is also called ____ cryptography.

A) private key
B) public key
C) symmetric key
D) shared key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
The simplest type of stream cipher is a ____ cipher.

A) shift
B) substitution
C) lock
D) loop
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
Cryptography cannot be applied to entire disks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
____ is designed to replace DES.

A) AES
B) Twofish
C) 3DES
D) RSA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
The algorithm ____ is a block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits.

A) RSA
B) AES
C) Blowfish
D) 3DES
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
One of the most famous ancient cryptographers was ____.

A) Albert Einstein
B) Isaac Newton
C) Julius Caesar
D) Caesar Augustus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
____ takes plaintext of any length and creates a hash 128 bits long.

A) RSA
B) SHA1
C) MD5
D) MD2
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
____ is a relatively recent cryptographic hash function that has received international recognition and adoption by standards organizations, including the International Organization for Standardization (ISO).

A) Twofish
B) Blowfish
C) Whirlpool
D) Rijndal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
____ is text that has no formatting (such as bolding or underlining) applied.

A) Plaintext
B) Plain text
C) Simpletext
D) Simple text
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
A ____ cipher rearranges letters without changing them.

A) substitution
B) block
C) loop
D) transposition
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
____ encryption uses two keys instead of only one and these keys are mathematically related.

A) Symmetric
B) Asymmetric
C) Shared
D) Public key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
The____ is a symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES.

A) AES
B) 3DES
C) RSA
D) Twofish
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
Self-encrypting HDD is commonly found in copiers and multifunction printers as well as point-of-sale systems used in government, financial, and medical environments.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
The most basic type of cryptographic algorithm is a ____ algorithm.

A) hash
B) key
C) digest
D) block
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
Most HSMs are PAN-based appliances that can provide services to multiple devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
Steganography can use image files, audio files, or even video files to contain hidden information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
The original cryptographic algorithms for encrypting and decrypting documents are ____________________ cryptographic algorithms.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
Explain hashing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
____ attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys as well as to detect eavesdropping.

A) Reactive cryptography
B) Symmetric cryptography
C) Analog cryptography
D) Quantum cryptography
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
DES is a(n) ____________________ cipher.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
Discuss how HMAC works.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
A ____ is a number divisible only by itself and 1.

A) prime number
B) prime decimal
C) compound number
D) neutral number
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
A(n) ____________________ is a method used by operating systems to store, retrieve, and organize files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
Describe how Message Digest2 (MD2) works.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
In information technology, ____________________ is the process of proving that a user performed an action, such as sending an e-mail message or a specific document.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
The ____ is essentially a chip on the motherboard of the computer that provides cryptographic services.

A) TPM
B) SCM
C) reference monitor
D) ODS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
Discuss how cryptography can help ensure the availability of the data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
List and describe the characteristics a hashing algorithm must have to be considered secure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
The ____ algorithm is the most common asymmetric cryptography algorithm and is the basis for several products.

A) AES
B) RSA
C) Twofish
D) Blowfish
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
____ was first proposed in the mid-1980s and it uses sloping curves.

A) FCC
B) RSA
C) ECC
D) IKE
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
Describe the RIPEMD hash.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
NTRUEncrypt uses ____ cryptography that relies on a set of points in space.

A) matrix-based
B) lattice-based
C) linear
D) quantum
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
Describe how a block cipher works.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
Cleartext data that is to be encrypted is called ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
Describe the origins of cryptography.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
Describe the purpose and composition of Suite B.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Describe hard disk drive encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
Takes data, divides it into smaller sections, and hides it in unused portions of a file
Ciphertext
Takes data, divides it into smaller sections, and hides it in unused portions of a file
Cryptography
Takes data, divides it into smaller sections, and hides it in unused portions of a file
Steganography
Takes data, divides it into smaller sections, and hides it in unused portions of a file
Cleartext
Takes data, divides it into smaller sections, and hides it in unused portions of a file
Decryption
Takes data, divides it into smaller sections, and hides it in unused portions of a file
Key
Takes data, divides it into smaller sections, and hides it in unused portions of a file
GPG
Takes data, divides it into smaller sections, and hides it in unused portions of a file
PGP
Takes data, divides it into smaller sections, and hides it in unused portions of a file
EFS
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
Ciphertext
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
Cryptography
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
Steganography
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
Cleartext
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
Decryption
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
Key
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
GPG
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
PGP
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
EFS
To change the secret message back to its original form
Ciphertext
To change the secret message back to its original form
Cryptography
To change the secret message back to its original form
Steganography
To change the secret message back to its original form
Cleartext
To change the secret message back to its original form
Decryption
To change the secret message back to its original form
Key
To change the secret message back to its original form
GPG
To change the secret message back to its original form
PGP
To change the secret message back to its original form
EFS
Data that is in an unencrypted form
Ciphertext
Data that is in an unencrypted form
Cryptography
Data that is in an unencrypted form
Steganography
Data that is in an unencrypted form
Cleartext
Data that is in an unencrypted form
Decryption
Data that is in an unencrypted form
Key
Data that is in an unencrypted form
GPG
Data that is in an unencrypted form
PGP
Data that is in an unencrypted form
EFS
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
Ciphertext
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
Cryptography
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
Steganography
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
Cleartext
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
Decryption
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
Key
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
GPG
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
PGP
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
EFS
Versions run on Windows, UNIX, and Linux operating systems
Ciphertext
Versions run on Windows, UNIX, and Linux operating systems
Cryptography
Versions run on Windows, UNIX, and Linux operating systems
Steganography
Versions run on Windows, UNIX, and Linux operating systems
Cleartext
Versions run on Windows, UNIX, and Linux operating systems
Decryption
Versions run on Windows, UNIX, and Linux operating systems
Key
Versions run on Windows, UNIX, and Linux operating systems
GPG
Versions run on Windows, UNIX, and Linux operating systems
PGP
Versions run on Windows, UNIX, and Linux operating systems
EFS
A cryptography system for Windows operating systems that use the Windows NTFS file system.
Ciphertext
A cryptography system for Windows operating systems that use the Windows NTFS file system.
Cryptography
A cryptography system for Windows operating systems that use the Windows NTFS file system.
Steganography
A cryptography system for Windows operating systems that use the Windows NTFS file system.
Cleartext
A cryptography system for Windows operating systems that use the Windows NTFS file system.
Decryption
A cryptography system for Windows operating systems that use the Windows NTFS file system.
Key
A cryptography system for Windows operating systems that use the Windows NTFS file system.
GPG
A cryptography system for Windows operating systems that use the Windows NTFS file system.
PGP
A cryptography system for Windows operating systems that use the Windows NTFS file system.
EFS
A mathematical value entered into the algorithm to produce ciphertext
Ciphertext
A mathematical value entered into the algorithm to produce ciphertext
Cryptography
A mathematical value entered into the algorithm to produce ciphertext
Steganography
A mathematical value entered into the algorithm to produce ciphertext
Cleartext
A mathematical value entered into the algorithm to produce ciphertext
Decryption
A mathematical value entered into the algorithm to produce ciphertext
Key
A mathematical value entered into the algorithm to produce ciphertext
GPG
A mathematical value entered into the algorithm to produce ciphertext
PGP
A mathematical value entered into the algorithm to produce ciphertext
EFS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.