What Goal Of Cryptography Is Gary Attempting To Achieve?

10 Questions | Total Attempts: 622

SettingsSettingsSettings
Cryptography Quizzes & Trivia

Questions and Answers
  • 1. 
    Betty receives a cipher text message from her colleague Tim. What type of function does Betty need to use to read the plaintext message?
    • A. 

      Encryption

    • B. 

      Hashing

    • C. 

      Decryption

    • D. 

      Validation

  • 2. 
    Alice and Bob would like to communicate with each other using a session key but they do not already have a shared secret key. Which algorithm can they use to exchange a secret key?
    • A. 

      Rivest, Shamir, Adelman

    • B. 

      Message digest algorithm (MD5)

    • C. 

      Blowfish

    • D. 

      Diffie-Hellman

  • 3. 
    Gary is sending a message to Patricia. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Gary attempting to achieve?
    • A. 

      Confidentiality

    • B. 

      Integrity

    • C. 

      Authentication

    • D. 

      Nonrepudiation

  • 4. 
    When Patricia receives a message from Gary, she wants to be able to demonstrate to Sue that the message actually came from Gary. What goal of cryptography is Patricia attempting to achieve?
    • A. 

      Confidentiality

    • B. 

      Integrity

    • C. 

      Authentication

    • D. 

      Nonrepudiation

  • 5. 
        Which information security objective allows trusted entities to endorse information?
    • A. 

      Validation

    • B. 

      Authorization

    • C. 

      Certification

    • D. 

      Witnessing

  • 6. 
    Which approach to cryptography provides the strongest theoretical protection?
    • A. 

      Quantum cryptography

    • B. 

      Asymmetric cryptography

    • C. 

      Elliptic curve cryptography

    • D. 

      Classic cryptography

  • 7. 
    Which type of cipher works by rearranging the characters in a message?
    • A. 

      Substitution

    • B. 

      Steganographic

    • C. 

      Transposition

    • D. 

      Asymmetric

  • 8. 
    Which set of characteristics describes the Caesar cipher accurately?
    • A. 

      Asymmetric, block, substitution

    • B. 

      Asymmetric, stream, transposition

    • C. 

      Symmetric, stream, substitution

    • D. 

      Symmetric, block, transposition

  • 9. 
    What is the only unbreakable cipher when it is used properly?
    • A. 

      Rivest-Shamir Adelman

    • B. 

      Vernam

    • C. 

      Elliptic Curve Diffie-Hellman in Ephemeral mode (ECDHE)

    • D. 

      Blowfish

  • 10. 
    Which cryptographic attack offers cryptanalysts the most information about how an encryption algorithm works?
    • A. 

      Chosen plaintext

    • B. 

      Ciphertext only

    • C. 

      Known plaintext

    • D. 

      Chosen ciphertext

Back to Top Back to top