Deck 7: Encryption Controls

ملء الشاشة (f)
exit full mode
سؤال
Public Key cryptography refers to

A) The use of the same key for both encryption and decryption
B) The use of a secret algorithm for encryption and decryption
C) The use of a secret key only decryption
D) The use of a secret key for encryption
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Electronic Code Book ECB is not used for encryption since it has inadequate

A) Licensing flexibility
B) Recovery features
C) Diffusion of confusion
D) Parallelism
سؤال
Ciphertext is

A) The transformation of data to produce ciphertext
B) Text that is unintelligible to the reader
C) A sequence of symbols that controls the operations of encipherment and decipherment
D) A well-defined sequence of steps used to describe cryptographic processes
E) An encryption method that uses no keys
سؤال
Encryption is

A) The transformation of data to produce ciphertext
B) Text that is unintelligible to the reader
C) A sequence of symbols that controls the operations of encipherment and decipherment
D) A well-defined sequence of steps used to describe cryptographic processes
E) An encryption method that uses no keys
سؤال
The current standard for secret key encryption is

A) DES Data Encryption Standard
B) AES Advanced Encryption Standard
C) IDEA International Data Encryption Algorithm
D) SHA Secure Hash Algorithm
سؤال
Public key encryption techniques used in practice are based heavily on

A) Division operations
B) Set operations
C) Extraction operations
D) Modulus operations
سؤال
Digital signatures are

A) The transformation of data to produce ciphertext
B) The use of cryptography that allows a user to prove the source and integrity of data
C) Text that is unintelligible to the reader
D) A sequence of symbols that controls the operations of encipherment and decipherment
سؤال
Block encryption uses both

A) Relational and Procedural operations
B) Substitution and permutation
C) Keys and hashes
D) Data and storage
سؤال
The word Cipher is based on an Arabic word, cifr, that means

A) Sender
B) Secret
C) Nothing
D) Receiver
سؤال
Cryptanalysis is

A) The art of breaking ciphertext
B) The transformation of data to produce ciphertext
C) The science of creating superior encryption algorithms
D) Text that is unintelligible to the reader
سؤال
Hash functions are used primarily for

A) Sharing a secret key prior to network transmission
B) Storing data on hard drives
C) Encrypting data during transmission over a network
D) Saving passwords
سؤال
In the context of encryption, a key is

A) A well-defined sequence of steps used to describe cryptographic processes
B) An encryption method that uses no keys
C) A sequence of symbols that controls the operations of encipherment and decipherment
D) Text that is unintelligible to the reader
سؤال
In using public key encryption, messages are deciphered using

A) A public key
B) A shared secret key
C) Any key
D) A private key
سؤال
Desirable properties In good encryption algorithms include

A) Generating characters that appear random
B) Generating output that appears to be of random length
C) Changing at least half the bits in the output when even one bit changes in the input
D) All the above
سؤال
Claude Shannon developed the framework for secrecy known as

A) Confusion diffusion
B) 4P model
C) 4C model
D) Inversion of control
سؤال
The first documented instance of encryption was used by

A) Egyptian pharaoh Tutankhamun
B) Italian inventor Leonardo da Vinci
C) Italian artist Michelangelo
D) Roman Emperor Julius Caesar
سؤال
Hash functions use

A) 2 keys
B) 1 key
C) 0 keys
D) Any of the above, depending upon the specific hash algorithm
سؤال
A cryptographic algorithm is

A) Symbols that controls encipherment and decipherment
B) A well-defined sequence of steps used to describe cryptographic processes
C) An encryption method that uses no keys
D) Text that is unintelligible to the reader
سؤال
Secret key cryptography refers to

A) The use of the same key for both encryption and decryption
B) The use of a secret algorithm for encryption and decryption
C) The use of a secret key only for decryption
D) The use of a secret key for encryption
سؤال
Public key encryption is used primarily for

A) Sharing a secret key prior to network transmission
B) Storing data on hard drives
C) Encrypting data during transmission over a network
D) Saving passwords
سؤال
The popular encryption method RSA is an example of

A) Secret key encryption
B) Public key encryption
C) Hash functions
D) AES
سؤال
A certificate used in web applications contains the

A) Shared secret key prior to network transmission
B) The hash output of the data to be transmitted
C) Saved password of the end user for recovery
D) Public key of the server and information about the key provider
سؤال
For any given input, the length of its hash out is

A) Always shorter than the input
B) Depends upon the length of the input
C) Always the same
D) Always longer than the input
سؤال
The most common technologies used for secure network communication are

A) VPN and SSL
B) AES and DES
C) PKI and RSA
D) Diffusion and confusion
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/24
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Encryption Controls
1
Public Key cryptography refers to

A) The use of the same key for both encryption and decryption
B) The use of a secret algorithm for encryption and decryption
C) The use of a secret key only decryption
D) The use of a secret key for encryption
C
2
Electronic Code Book ECB is not used for encryption since it has inadequate

A) Licensing flexibility
B) Recovery features
C) Diffusion of confusion
D) Parallelism
Diffusion of confusion
3
Ciphertext is

A) The transformation of data to produce ciphertext
B) Text that is unintelligible to the reader
C) A sequence of symbols that controls the operations of encipherment and decipherment
D) A well-defined sequence of steps used to describe cryptographic processes
E) An encryption method that uses no keys
B
4
Encryption is

A) The transformation of data to produce ciphertext
B) Text that is unintelligible to the reader
C) A sequence of symbols that controls the operations of encipherment and decipherment
D) A well-defined sequence of steps used to describe cryptographic processes
E) An encryption method that uses no keys
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
5
The current standard for secret key encryption is

A) DES Data Encryption Standard
B) AES Advanced Encryption Standard
C) IDEA International Data Encryption Algorithm
D) SHA Secure Hash Algorithm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
6
Public key encryption techniques used in practice are based heavily on

A) Division operations
B) Set operations
C) Extraction operations
D) Modulus operations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
7
Digital signatures are

A) The transformation of data to produce ciphertext
B) The use of cryptography that allows a user to prove the source and integrity of data
C) Text that is unintelligible to the reader
D) A sequence of symbols that controls the operations of encipherment and decipherment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
8
Block encryption uses both

A) Relational and Procedural operations
B) Substitution and permutation
C) Keys and hashes
D) Data and storage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
9
The word Cipher is based on an Arabic word, cifr, that means

A) Sender
B) Secret
C) Nothing
D) Receiver
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
10
Cryptanalysis is

A) The art of breaking ciphertext
B) The transformation of data to produce ciphertext
C) The science of creating superior encryption algorithms
D) Text that is unintelligible to the reader
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
11
Hash functions are used primarily for

A) Sharing a secret key prior to network transmission
B) Storing data on hard drives
C) Encrypting data during transmission over a network
D) Saving passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
12
In the context of encryption, a key is

A) A well-defined sequence of steps used to describe cryptographic processes
B) An encryption method that uses no keys
C) A sequence of symbols that controls the operations of encipherment and decipherment
D) Text that is unintelligible to the reader
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
13
In using public key encryption, messages are deciphered using

A) A public key
B) A shared secret key
C) Any key
D) A private key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
14
Desirable properties In good encryption algorithms include

A) Generating characters that appear random
B) Generating output that appears to be of random length
C) Changing at least half the bits in the output when even one bit changes in the input
D) All the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
15
Claude Shannon developed the framework for secrecy known as

A) Confusion diffusion
B) 4P model
C) 4C model
D) Inversion of control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
16
The first documented instance of encryption was used by

A) Egyptian pharaoh Tutankhamun
B) Italian inventor Leonardo da Vinci
C) Italian artist Michelangelo
D) Roman Emperor Julius Caesar
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
17
Hash functions use

A) 2 keys
B) 1 key
C) 0 keys
D) Any of the above, depending upon the specific hash algorithm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
18
A cryptographic algorithm is

A) Symbols that controls encipherment and decipherment
B) A well-defined sequence of steps used to describe cryptographic processes
C) An encryption method that uses no keys
D) Text that is unintelligible to the reader
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
19
Secret key cryptography refers to

A) The use of the same key for both encryption and decryption
B) The use of a secret algorithm for encryption and decryption
C) The use of a secret key only for decryption
D) The use of a secret key for encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
20
Public key encryption is used primarily for

A) Sharing a secret key prior to network transmission
B) Storing data on hard drives
C) Encrypting data during transmission over a network
D) Saving passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
21
The popular encryption method RSA is an example of

A) Secret key encryption
B) Public key encryption
C) Hash functions
D) AES
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
22
A certificate used in web applications contains the

A) Shared secret key prior to network transmission
B) The hash output of the data to be transmitted
C) Saved password of the end user for recovery
D) Public key of the server and information about the key provider
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
23
For any given input, the length of its hash out is

A) Always shorter than the input
B) Depends upon the length of the input
C) Always the same
D) Always longer than the input
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
24
The most common technologies used for secure network communication are

A) VPN and SSL
B) AES and DES
C) PKI and RSA
D) Diffusion and confusion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.