# Quiz 3: Cryptography

Computing

Q 1Q 1

The XOR encryption method should be used by itself when an organization is transmitting or storing sensitive data.

Free

True False

False

Free

True False

True

Q 3Q 3

When it comes to cryptosystems, the security of encrypted data is dependent on keeping the encrypting algorithm secret.

Free

True False

False

Free

True False

Free

True False

Q 6Q 6

____ provides verification that a message was sent by a particular sender and cannot be refuted.
A) Authentication
C) Authorization
B) Nonrepudiation
D) Integrity

Free

Multiple Choice

Q 7Q 7

Bit stream methods commonly use algorithm functions like ____.
A) the XOR operation
C) transposition
B) substitution
D) permutation

Free

Multiple Choice

Q 8Q 8

Which cipher is made from a table of 26 distinct cipher alphabets?
A) Vernam
C) Caesar
B) Polyalphabetic substitution
D) Vigenère Square

Free

Multiple Choice

Q 9Q 9

Which cipher simply rearranges the values within a block to create the ciphertext?
A) Transposition
C) Caesar
B) Substitution
D) Vigenère Square

Free

Multiple Choice

Q 10Q 10

In modulo 26, what happens if a number is larger than 26?
A) The result is 26.
B) An error occurs and the operation stops.
C) Twenty-six is sequentially subtracted from it until the number is in the proper range.
D) Twenty-six is repeatedly divided into the original number until the remainder is in the proper range.

Free

Multiple Choice

Q 11Q 11

Which cipher uses a stencil or template with holes cut out?
A) Vernam
C) Book
B) Vigenère Square
D) Grille

Free

Multiple Choice

Q 12Q 12

Hash ____ are mathematical functions that create a hash value, also known as a message digest, by converting variable-length messages into a single fixed-length value.
A) digests
C) algorithms
B) keys
D) codes

Free

Multiple Choice

Q 13Q 13

Encryption methodologies that require the same secret key to encipher and decipher the message are using ____ encryption or symmetric encryption.
A) public key
C) monoalphabetic
B) private key
D) monolithic

Free

Multiple Choice

Q 14Q 14

One of the most widely known symmetric encryption cryptosystems is ____.
A) DES
C) RSA
B) WPA
D) AES

Free

Multiple Choice

Q 15Q 15

Which symmetric encryption cryptosystems was developed to replace both DES and 3DES?
A) DES
C) RSA
B) WEP
D) AES

Free

Multiple Choice

Q 16Q 16

Public-key encryption is based on a ____.
A) message authentication code (MAC)
C) hash value
B) certificate
D) key

Free

Multiple Choice

Q 17Q 17

Which algorithm was the first asymmetric, or public-key, encryption algorithm developed (in 1977) and published for commercial use?
A) MAC
C) DES
B) RSA
D) AES

Free

Multiple Choice

Q 18Q 18

The most common hybrid cryptography system is based on the ____ key exchange, which is a method for exchanging private keys using public-key encryption.
A) MAC
C) DES
B) RSA
D) Diffie-Hellman

Free

Multiple Choice

Q 19Q 19

When deploying ciphers, users have to decide on the ____ of the cryptovariable or key.
A) security
C) size
B) symmetry
D) transportability

Free

Multiple Choice

Q 20Q 20

____ is an open-source protocol framework for security development within the TCP/IP family of protocol standards.
A) RSA
C) SSH
B) IPSec
D) SSL

Free

Multiple Choice

Q 21Q 21

The ____ protocol is used for public-key encryption to secure a channel over the Internet.
A) RSA
C) SSH
B) IPSec
D) SSL

Free

Multiple Choice

Q 22Q 22

____ builds on the encoding format of the MIME protocol and uses digital signatures based on public-key cryptosystems to secure e-mail.
A) S/MIME
C) SSH
B) PGP
D) SSL

Free

Multiple Choice

Free

Multiple Choice

Q 24Q 24

Digital ____ authenticate the cryptographic key that is embedded in the certificate.
A) logs
C) certificates
B) hashes
D) signatures

Free

Multiple Choice

Q 25Q 25

An X.509 v3 certificate binds a ____, which uniquely identifies a certificate entity, to a user's public key.
A) signature
C) certificate
B) hash value
D) distinguished name (DN)

Free

Multiple Choice

Q 26Q 26

Where is information most vulnerable?
A) When it is inside the organization's systems
B) When it is outside the organization's systems
C) When it is being saved on a backup tape inside the organization's systems
D) When it is being saved to a Microsoft product inside the organization's systems

Free

Multiple Choice

Q 27Q 27

The science of encryption, known as ____________________, encompasses both cryptography and cryptanalysis.

Free

Short Answer

Q 28Q 28

____________________ functions are mathematical algorithms that generate a message summary or digest (sometimes called a fingerprint) that can be used to confirm the identity of a specific message and/or confirm that there have not been any changes to the content.

Free

Short Answer

Q 29Q 29

____________________ keys are limited-use symmetric keys for temporary communications; they allow two organizations to conduct quick, efficient, secure communications based on symmetric encryption.

Free

Short Answer

Q 30Q 30

Digital ____________________ are public-key container files that allow computer programs to validate the key and identify to whom it belongs.

Free

Short Answer

Q 31Q 31

In a(n) ____________________ attack, the attacker eavesdrops on the victim's session and uses statistical analysis of patterns and inter-keystroke timings to discern sensitive session information.

Free

Short Answer

Q 32Q 32

Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
-The hiding of messages in such a way that no one but the sender and intended recipient of the message even knows a message exists

Free

Short Answer

Q 33Q 33

Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
-An encryption method or process encompassing the algorithm, key(s) and/or cryptovariable(s), and procedures used to perform encryption and decryption

Free

Short Answer

Q 34Q 34

Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
-The process of rearranging plaintext values to form ciphertext

Free

Short Answer

Q 35Q 35

Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
-The encoded message resulting from an encryption

Free

Short Answer

Q 36Q 36

Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
-To encrypt, encode, or convert plaintext into the equivalent ciphertext

Free

Short Answer

Q 37Q 37

Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
-The process of replacing plaintext values with other values to form ciphertext

Free

Short Answer

Q 38Q 38

Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
-To decrypt, decode, or convert ciphertext into the equivalent plaintext

Free

Short Answer

Q 39Q 39

Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
-The programmatic steps used to convert an unencrypted message into an encrypted sequence of bits that represents the message

Free

Short Answer

Q 40Q 40

Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
-The process of converting components (words or phrases) of an unencrypted message into encrypted components

Free

Short Answer

Q 41Q 41

Describe the exclusive OR operation (XOR) function and explain where XOR encryption is used.

Free

Essay

Free

Essay

Free

Essay

Free

Essay

Free

Essay

Free

Essay

Free

Essay

Free

Essay

Free

Essay

Free

Essay