Computer Forensics Midterm

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is the key length used for DES? A. 56 B. 64 C. 128 D. 256

A. 56

How many rounds does DES have? A. 64 B. 56 C. 16 D. 4

C. 16

Which of the following encryption algorithms uses three key ciphers in a block system and uses the Rijndael algorithm? A. DES B. RSA C. AES D. NSA

C. AES

The Caesar cipher is the oldest known encryption method. A. True B. False

A. True

In steganography, the ________ is the data to be covertly communicated. In other words, it is the message you want to hide. A. payload B. carrier C. signal D. channel

A. payload

3. What type of encryption uses a different key to encrypt the message than it uses to decrypt the message? A. Private key B. Asymmetric C. Symmetric D. Secure

B. Asymmetric

Which of the following is an example of a multialphabet cipher? A. Caesar B. Vigenère C. Atbash D. ROT13

B. Vigenère

In steganography, the ________ is the stream or file into which the data is hidden. A. payload B. carrier C. signal D. channel

B. carrier

An improvement on the Caesar cipher that uses more than one shift is called ________. A. DES encryption B. multialphabet substitution C. IDEA D. Triple DES

B. multialphabet substitution

The most common way steganography is accomplished is via ________. A. MSB B. ASB C. RSB D. LSB

D. LSB

Which of the following is an asymmetric cryptography algorithm invented by three mathematicians in the 1970s? A. PGP B. DES C. DSA D. RSA

D. RSA

Hiding messages inside another medium is referred to as ________. A. cryptography B. cryptology C. steganalysis D. steganography

D. steganography


Conjuntos de estudio relacionados

Fundamentals of Taxation for Individuals, 23.1, 23.2, 23.6

View Set

Chapter 22: The Child with Gastrointestinal Dysfunction Hockenberry: Wong's Essentials of Pediatric Nursing, 10th Edition

View Set

Chapter 3: Ethics and Law for the Medical Office

View Set

Psychobiological Disorders; Foundations and Practice of Mental Health nursing

View Set