Take Another Quiz

CHAP 11

15 Questions
Chap 11

CHAPTER 11 QUIZ

Questions and Answers
  • 1. 
    Is designed to replace DES.
    • A. 

      RSA

    • B. 

      Twofish

    • C. 

      3DES

    • D. 

      AES

  • 2. 
    Attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys as well as to detect eavesdropping.
    • A. 

      Quantum cryptography

    • B. 

      Reactive cryptography

    • C. 

      Symmetric cryptography

    • D. 

      Analog cryptography

  • 3. 
    Cryptography cannot be applied to entire disks.
    • A. 

      True

    • B. 

      False

  • 4. 
    Ensures that the information is correct and no unauthorized person or malicious software has altered that data.
    • A. 

      Confidentiality

    • B. 

      Integrity

    • C. 

      Encryption

    • D. 

      Availability

  • 5. 
    One of the most famous ancient cryptographers was ____.
    • A. 

      Julius Caesar

    • B. 

      Caesar Augustus

    • C. 

      Isaac Newton

    • D. 

      Albert Einstein

  • 6. 
    Symmetric encryption is also called ____ cryptography.
    • A. 

      Shared key

    • B. 

      Symmetric key

    • C. 

      Private key

    • D. 

      Public key

  • 7. 
    Was first proposed in the mid-1980s  and it uses sloping curves.
    • A. 

      ECC

    • B. 

      IKE

    • C. 

      RSA

    • D. 

      FCC

  • 8. 
    Self-encrypting HDD is commonly found in copiers and multifunction printers as well as point-of-sale systems used in government, financial, and medical environments.
    • A. 

      False

    • B. 

      True

  • 9. 
    A ____ cipher rearranges letters without changing them.
    • A. 

      substitution

    • B. 

      Block

    • C. 

      Loop

    • D. 

      Transposition

  • 10. 
    A ____ is a number divisible only by itself and 1.
    • A. 

      Neutral number

    • B. 

      Prime number

    • C. 

      Compound number

    • D. 

      Prime decimal

  • 11. 
    Is text that has no formatting (such as bolding or underlining) applied.
    • A. 

      Plain text

    • B. 

      Plaintext

    • C. 

      Simpletext

    • D. 

      Simple text

  • 12. 
    Is a relatively recent cryptographic hash function that has received international recognition and adoption by standards organizations, including the International Organization for Standardization (ISO).
    • A. 

      Twofish

    • B. 

      Blowfish

    • C. 

      Whirlpool

    • D. 

      Rijndal

  • 13. 
     takes plaintext of any length and creates a hash 128 bits long.
    • A. 

      SHA1

    • B. 

      MD5

    • C. 

      RSA

    • D. 

      MD2

  • 14. 
    The algorithm ____ is a block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits.
    • A. 

      Blowfish

    • B. 

      3DES

    • C. 

      RSA

    • D. 

      AES

  • 15. 
    A hash that is created from a set of data can be reversed.
    • A. 

      False

    • B. 

      True