Guide to Network Security

Computing

Quiz 3 :

Cryptography

Quiz 3 :

Cryptography

Question Type
search
arrow
____ provides verification that a message was sent by a particular sender and cannot be refuted.
Free
Multiple Choice
Answer:

Answer:

B

Tags
Choose question tag
close menu
arrow
Bit stream methods commonly use algorithm functions like ____.
Free
Multiple Choice
Answer:

Answer:

A

Tags
Choose question tag
close menu
arrow
One of the most widely known symmetric encryption cryptosystems is ____.
Free
Multiple Choice
Answer:

Answer:

A

Tags
Choose question tag
close menu
arrow
Steganography is technically a form of cryptography.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Which cipher uses a stencil or template with holes cut out?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
When it comes to cryptosystems, the security of encrypted data is dependent on keeping the encrypting algorithm secret.
True False
Answer:
Tags
Choose question tag
close menu
arrow
The most common hybrid cryptography system is based on the ____ key exchange, which is a method for exchanging private keys using public-key encryption.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Hash functions confirm message identity and integrity.
True False
Answer:
Tags
Choose question tag
close menu
arrow
In modulo 26, what happens if a number is larger than 26?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which algorithm was the first asymmetric, or public-key, encryption algorithm developed (in 1977) and published for commercial use?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which cipher is made from a table of 26 distinct cipher alphabets?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which symmetric encryption cryptosystems was developed to replace both DES and 3DES?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
____ is an open-source protocol framework for security development within the TCP/IP family of protocol standards.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Hash ____ are mathematical functions that create a hash value, also known as a message digest, by converting variable-length messages into a single fixed-length value.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which cipher simply rearranges the values within a block to create the ciphertext?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
When deploying ciphers, users have to decide on the ____ of the cryptovariable or key.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Digital signatures are encrypted messages that can be mathematically proven authentic.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Public-key encryption is based on a ____.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
The XOR encryption method should be used by itself when an organization is transmitting or storing sensitive data.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Encryption methodologies that require the same secret key to encipher and decipher the message are using ____ encryption or symmetric encryption.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
Showing 1 - 20 of 50