Ready to test your Knowledge?
Try out our new practice tests completely free!
exam preparation banner icon

Network Defense

Computing

Quiz 6 :

Encryption

Quiz 6 :

Encryption

search
arrow
Which is a block cipher developed by Belgian researchers and providing 128-,192-,and 256-bit key sizes?
Free
Multiple Choice
Answer:

Answer:

A

arrow
Which is true about public key encryption?
Free
Multiple Choice
Answer:

Answer:

B

arrow
Which is NOT an encryption method?
Free
Multiple Choice
Answer:

Answer:

B

arrow
Changing a message in a such a way that it can be read easily by the intended recipient but cannot be read easily by any intercepting party is called ____________.
Short Answer
Answer:
arrow
Many encryption techniques such as XOR are easily broken because:
Multiple Choice
Answer:
arrow
Operations not found in normal math that can be performed on binary numbers include all of the following EXCEPT:
Multiple Choice
Answer:
arrow
Which is a very complicated block cipher using 128-bit keys to generate sub-keys to be applied to multiple blocks at the same time?
Multiple Choice
Answer:
arrow
Which is a symmetric block cipher developed in 1993 that provides variable-length key sizes ranging from 32 to 448 bits?
Multiple Choice
Answer:
arrow
Which is NOT a way in which quantum physics might improve encryption in the future?
Multiple Choice
Answer:
arrow
Which is a powerful password cracker that works on Windows and Linux platforms?
Multiple Choice
Answer:
arrow
Which is a symmetric key encryption system?
Multiple Choice
Answer:
arrow
Which is a very early encryption method?
Multiple Choice
Answer:
arrow
Attempting to determine a password by simply trying every possible combination within the set parameters until successful is called:
Multiple Choice
Answer:
arrow
An improvement over the Caesar cipher is based on ____________ substitution.
Short Answer
Answer:
arrow
Which type of encrypted communication is most common?
Multiple Choice
Answer:
arrow
Which is a weakness of Data Encryption Standard?
Multiple Choice
Answer:
arrow
Which is a public key encryption standard developed by three mathematicians in 1977 that provides very high but slow security?
Multiple Choice
Answer:
arrow
Which is NOT a part of a step in the XOR operation of encryption method.
Multiple Choice
Answer:
arrow
The ____________ cipher is a very old encryption method used by ancient Romans.
Short Answer
Answer:
arrow
Which is a widely used public key system that is considered by many experts to be very secure and is available as a plug-in for Netscape Messenger,MSN Messenger,and other communication software?
Multiple Choice
Answer:
Showing 1 - 20 of 25