We have sent an email with your new password.


Chap 11

15 Questions  I  By Dukeman
CHAP 11
CHAPTER 11 QUIZ

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  Is designed to replace DES.
A.
B.
C.
D.
2.  Attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys as well as to detect eavesdropping.
A.
B.
C.
D.
3.  Cryptography cannot be applied to entire disks.
A.
B.
4.  Ensures that the information is correct and no unauthorized person or malicious software has altered that data.
A.
B.
C.
D.
5.  One of the most famous ancient cryptographers was ____.
A.
B.
C.
D.
6.  Symmetric encryption is also called ____ cryptography.
A.
B.
C.
D.
7.  Was first proposed in the mid-1980s  and it uses sloping curves.
A.
B.
C.
D.
8.  Self-encrypting HDD is commonly found in copiers and multifunction printers as well as point-of-sale systems used in government, financial, and medical environments.
A.
B.
9.  A ____ cipher rearranges letters without changing them.
A.
B.
C.
D.
10.  A ____ is a number divisible only by itself and 1.
A.
B.
C.
D.
11.  Is text that has no formatting (such as bolding or underlining) applied.
A.
B.
C.
D.
12.  Is a relatively recent cryptographic hash function that has received international recognition and adoption by standards organizations, including the International Organization for Standardization (ISO).
A.
B.
C.
D.
13.   takes plaintext of any length and creates a hash 128 bits long.
A.
B.
C.
D.
14.  The algorithm ____ is a block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits.
A.
B.
C.
D.
15.  A hash that is created from a set of data can be reversed.
A.
B.
Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz