CRYPTO

¡Supera tus tareas y exámenes ahora con Quizwiz!

Unit 01 - Q073: In the DES algorithm the round key is __________ bit and the Round Input is ____________bits. A) 48, 32 B) 64, 32 C) 56, 24 D) 32, 32

ANSWER: A

Unit 01 - Q074: The number of unique substitution boxes in DES after the 48 bit XOR operation are A) 8 B) 4 C) 6 D) 12

ANSWER: A

Unit 01 - Q085: The 4 x 4 byte matrices in the AES algorithm are called A) States B) Words C) Transitions D) Permutations

ANSWER: A

Unit 01 - Q090: Which of the following modes does not implement chaining or dependency on previous stage computations? A) CTR, ECB B) CTR, CFB C) CFB, OFB D) ECB, OFB

ANSWER: A

Unit 01 - Q091: Which of the following modes of operation does not involve feedback? A) ECB B) CBC C) CTR D) OFB

ANSWER: A

Unit 01 - Q092: Which of the following is a natural candidates for stream ciphers? A) OFB B) CFB C) CBC D) ECB

ANSWER: A

Unit 01 - Q094: TRNG stands for A) True Random Number Generation B) Trust Random Number Generation C) Text Ring Number Generators D) None of the mentioned.

ANSWER: A

Unit 01 - Q098: Which among the following cannot be used in the case of stream ciphers? A) TRNG B) PRNGs C) PRFs D) None of the mentioned.

ANSWER: A

U011-Q001: What bit hash value does MD5 produce? { A)96 B)128 C)160 D)256

ANSWER: B

U05-Q001: What is the function of the S-Box in the AES algorithm? { A)Replaces data using a lookup table B)Shift the data C)Performs an exclusive-or operation using chained blocks D)Regenerate the key

ANSWER: B

U07-Q001: What is the term used for the secret key for symmetric encryption that is generated for use for a short period of time? { A)stream key B)session key C)sequence key D)master key

ANSWER: B

U09-Q001: Asymmetric key is also called { A)Secret key B)Public key C)Private key DNone of the mentioned

ANSWER: B

Unit 01 - Q002: The ________is the original message before transformation. A) ciphertext B) plaintext C) secret-text D) None of the mentioned.

ANSWER: B

Unit 01 - Q005: A(n) ______ algorithm transforms ciphertext to plaintext. A) encryption B) decryption C) Quadruple D) None of the mentioned.

ANSWER: B

Unit 01 - Q010: In a(n) ________ cipher, a pair of keys is used. A) symmetric-key B) asymmetric-key C) public-key D) None of the mentioned.

ANSWER: B

Unit 01 - Q011: In an asymmetric-key cipher, the sender uses the__________ key to encrypt plaintext A) private B) public C) All of the mentioned answers D) None of the mentioned.

ANSWER: B

Unit 01 - Q017: The ________ cipher reorders the plaintext characters to create a ciphertext. A) substitution B) transposition C) round D) None of the mentioned.

ANSWER: B

Unit 01 - Q019: A(n) _______is a keyless transposition cipher with N inputs and M outputs that uses a table to define the relationship between the input stream and the output stream. A) S-box B) P-box C) T-box D) None of the mentioned.

ANSWER: B

Unit 01 - Q024: DES uses a key generator to generate sixteen _______ round keys. A) 32-bit B) 48-bit C) 54-bit D) 42-bit

ANSWER: B

Unit 01 - Q025: DES was designed to increase the size of the DES key A) Double B) Triple C) Quadruple D) None of the mentioned.

ANSWER: B

Unit 01 - Q027: AES has _____ different configurations A) two B) three C) four D) five

ANSWER: B

Unit 01 - Q032: What risks arise when using the same key to encrypt both directions of a communication channel, that are not present if using different keys for the different directions? A) Message tampering by flipping bits in the ciphertext. B) Reflection attacks. C) Hash collisions. D) Eavesdropping attacks.

ANSWER: B

Unit 01 - Q033: In asymmetric key cryptography, the private key is kept by A) sender B) receiver C) sender and receiver D) all the connected devices to the network

ANSWER: B

Unit 01 - Q038: The Playfair Cipher uses a matrix of size A) 4 x 4 B) 5 x 5 C) 6 x 6 D) 7 x 7

ANSWER: B

Unit 01 - Q044: The Diffie-Hellman key exchange protocols needs ___ messages to finish key exchange. A) 1 B) 2 C) 3 D) 4

ANSWER: B

Unit 01 - Q070: Presenting an identifier to the security system is the __________ step. A) identification B) verification C) authentication D) clarification

ANSWER: A

Unit 01 - Q072: Which hash functions are used in S/MIME? A) MD5 and SHA-1 B) MD4 and MD5 C) MD5 and SHA-2 D) SHA-1 and SHA-2

ANSWER: A

Unit 01 - Q049: Today, many Internet businesses and users take advantage of cryptography based on this approach. A) public key infrastructure B) output feedback C) Encrypting File System D) single signon

ANSWER: A

U011-Q003: Which of the following is an update to Secure Hash Algorithm (SHA)? { A)SHA-1 B)SHA2 C)SHB D)SHAA

ANSWER: A

U012-Q001: Which of the following is derived from the message and a key and is used to verify the integrity of a message? { A)MAC B)BDC C)ERC D)CDC

ANSWER: A

U03-Q001: If both sender and receiver use the same key, the system is referred to as: { A)symmetric key encryption B)asymmetric key encryption C)public key encryption D)one key encryption

ANSWER: A

Unit 01 - Q0013: A ________ cilces one character with another character. A) substitution B) transposition C) round D) None of the mentioned.

ANSWER: A

Unit 01 - Q001: ________ is the science and art of transforming messages to make them secure and immune to attacks. A) Cryptography B) Cryptoanalysis C) Cryptography AND Cryptoanalysis D) None of the mentioned.

ANSWER: A

Unit 01 - Q003: The ________ is the message after transformation. A) ciphertext B) plaintext C) secret-text D) None of the mentioned.

ANSWER: A

Unit 01 - Q004: A(n) _______ algorithm transforms plaintext to ciphertext A) encryption B) decryption C) Quadruple D) None of the mentioned.

ANSWER: A

Unit 01 - Q006: A combination of an encryption algorithm and a decryption algorithm is called a ________. A) cipher B) secret C) key D) None of the mentioned.

ANSWER: A

Unit 01 - Q008: In a(n) ________ cipher, the same key is used by both the sender and receiver. A) symmetric-key B) asymmetric-key C) public-key D) None of the mentioned.

ANSWER: A

Unit 01 - Q009: In a(n) ________, the key is called the secret key. A) symmetric-key B) asymmetric-key C) public-key D) None of the mentioned.

ANSWER: A

Unit 01 - Q012: In an asymmetric-key cipher, the receiver uses the ______ key to decrypt ciphertext A) private B) public C) pre-shared key D) None of the mentioned.

ANSWER: A

Unit 01 - Q014: _________ ciphers can be categorized into two broad categories: monoalphabetic and polyalphabetic. A) Substitution B) Transposition C) round D) None of the mentioned.

ANSWER: A

Unit 01 - Q018: A(n) ______ is a keyless substitution cipher with N inputs and M outputs that uses a formula to define the relationship between the input stream and the output stream. A) S-box B) P-box C) T-box D) None of the mentioned.

ANSWER: A

Unit 01 - Q020: A modern cipher is usually a complex _____cipher made of a combination of different simple ciphers. A) round B) circle C) square D) None of the mentioned.

ANSWER: A

Unit 01 - Q021: DES is a(n) ________ method adopted by the U.S. government. A) symmetric-key B) asymmetric-key C) public-key D) None of the mentioned.

ANSWER: A

Unit 01 - Q028: ECB and CBC are ________ ciphers. A) block B) stream C) field D) None of the mentioned.

ANSWER: A

Unit 01 - Q030: The ________ method provides a one-time session key for two parties. A) Diffie-Hellman B) RSA C) DES D) AES

ANSWER: A

Unit 01 - Q031: The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other. A) man-in-the-middle B) ciphertext attack C) plaintext attack D) None of the mentioned.

ANSWER: A

Unit 01 - Q035: What is data encryption standard (DES)? A) block cipher B) stream cipher C) bit cipher D) None of the mentioned.

ANSWER: A

Unit 01 - Q036: Cryptanalysis is used A) to find some insecurity in a cryptographic scheme B) to increase the speed C) to encrypt the data D) None of the mentioned.

ANSWER: A

Unit 01 - Q041: The term keystream is usually connected with A) stream ciphers B) block ciphers C) public-key ciphers D) key-exchange protocols

ANSWER: A

Unit 01 - Q043: On which hard mathematical problem does RSA base its security? A) Factorization of big numbers B) Finding big prime numbers C) Multiplication of big prime numbers D) Exponentiation of big numbers

ANSWER: A

Unit 01 - Q045: Substitution ciphers. A) The order of plaintext letters is rearranged during encryption. B) Letters of the plaintext messages are replaced with other letters during the encryption. C) Exponentiation of big numbers D) None of the mentioned.

ANSWER: B

Unit 01 - Q047: In the symmetric key cryptography both sender and receiver posses ______ A) Different keys. B) Same key. C) Public key. D) None of the mentioned.

ANSWER: B

Unit 01 - Q050: This is the name for the issuer of a PKI certificate. A) man in the middle B) certificate authority C) Resource Access Control Facility D) script kiddy

ANSWER: B

Unit 01 - Q071: PGP provides authentication through the use of _________ . A) digital signatures B) asymmetric block encryption C) symmetric block encryption D) data compression

ANSWER: B

Unit 01 - Q075: Use Caesars Cipher to decipher the following: HQFUBSWHG WHAW A) ABANDONED LOCK B) ENCRYPTED TEXT C) ABANDONED TEXT D) ENCRYPTED LOCK

ANSWER: B

Unit 01 - Q076: Caesar Cipher is an example of A) Poly-alphabetic Cipher B) Mono-alphabetic Cipher C) Multi-alphabetic Cipher D) Bi-alphabetic Cipher

ANSWER: B

Unit 01 - Q078: On Encrypting thepepsiisintherefrigerator using Vignere Cipher System using the keyword HUMOR. we get cipher text A) abqdnwewuwjphfvrrtrfznsdokvl B) abqdvmwuwjphfvvyyrfznydokvl C) tbqyrvmwuwjphfvvyyrfznydokvl D) baiuvmwuwjphfoeiyrfznydokvl

ANSWER: B

Unit 01 - Q083: How many rounds does the AES-192 perform? A) 10 B) 12 C) 14 D) 16

ANSWER: B

Unit 01 - Q086: For the AES-128 algorithm there are __________ similar rounds and _________ round is different. A) 2 pair of 5 similar rounds ; every alternate B) 9 ; the last C) 8 ; the first and last D) 10 ; no

ANSWER: B

Unit 01 - Q087: Which of the 4 operations are false for each round in the AES algorithm: i) Substitute Bytes, ii) Shift Columns, iii) Mix Rows, iv) XOR Round Key. A) i) only B) ii) iii) and iv) C) ii) and iii) D) only iv)

ANSWER: B

Unit 01 - Q093: PRNG stands for A) Personal Random Number Generation B) Pseudo Random Number Generation C) Primitive Number Generators D) Private Number Generators

ANSWER: B

Unit 01 - Q096: PRNGs take in an input which is referred to as A) bit stream B) seed C) entropy source D) external variable

ANSWER: B

Unit 01 - Q097: The property that there should be equally likely number of 1s and 0s in a Pseudo Random Number sequence is A) Scalability B) Uniformity C) Stability D) Consistency

ANSWER: B

U01-Q001: Input message in Cryptography is called; { A)Plain text B)Cipher Text C)Plain and cipher D)None of the mentioned

ANSWER: C

U01-Q002: Which of the following involves looking at blocks of an encrypted message to determine whether any common patterns exist? { A)Quantum cryptography B)Algorithm errors C)Frequency analysis D)Brute-force attacks

ANSWER: C

U011-Q002: What bit hash value does Secure Hash Algorithm (SHA) produce? { A)96 B)128 C)160 D)256

ANSWER: C

U011-Q004: Hash algorithms are used to { A)Scramble data as part of the encryption process B)Create a digital signature that is unique to a given input file C)Create a delicious breakfast served with eggs over easy D)None of the mentioned

ANSWER: C

U02-Q002: The only cipher system said to be unbreakable by brute force is { A)AES B)DES C)One-time pad D)Triple DES

ANSWER: C

U04-Q001: What is the block cipher structure in DES? { A)SAC B)Shannon C)Feistel D)Rendell

ANSWER: C

U09-Q003: Which of the following is an asymmetric algorithm based on calculating logarithms? { A)ECC B)Diffie-Hellman C)El Gamal D)RSA

ANSWER: C

U09-Q004: The key exchange protocol is vulnerable to a __________ attack because it does not authenticate the participants. { A)chosen ciphertext B)man-in-the-middle C)replay D)differential cryptanalysis

ANSWER: C

Unit 01 - Q007: The _______ is a number or a set of numbers on which the cipher operates. A) cipher B) secret C) key D) None of the mentioned.

ANSWER: C

Unit 01 - Q015: The _______ cipher is the simplest monoalphabetic cipher. It uses modular arithmetic with a modulus of 26. A) transposition B) additive C) shift D) None of the mentioned.

ANSWER: C

Unit 01 - Q016: The Caesar cipher is a _______cipher that has a key of 3. A) transposition B) additive C) shift D) None of the mentioned.

ANSWER: C

Unit 01 - Q022: DES has an initial and final permutation block and _________ rounds. A) 14 B) 15 C) 16 D) None of the mentioned.

ANSWER: C

Unit 01 - Q023: The DES function has _______ components. A) 2 B) 3 C) 4 D) 5

ANSWER: C

Unit 01 - Q029: One commonly used public-key cryptography method is the ______ algorithm. A) DES B) RC4 C) RSA D) AES

ANSWER: C

Unit 01 - Q034: Which one of the following algorithm is not used in asymmetric-key cryptography? A) rsa algorithm B) diffie-hellman algorithm C) electronic code book algorithm D) None of the mentioned.

ANSWER: C

Unit 01 - Q039: S-boxes in DES map A) 2 to 4 bits B) 4 to 4 bits C) 6 to 4 bits D) 4 to 6 bits

ANSWER: C

Unit 01 - Q042: Which two important issues are addressed with public-key cryptography A) Production of big prime numbers and their multiplication B) Factorization of natural numbers and discrete logarithm problem C) Key distribution and Digital signatures D) Production of master and session keys

ANSWER: C

Unit 01 - Q046: When trying to crack a code using by trying all the possibilities, this method is known as ____________. A) Caesar cipher. B) Cyberspace C) Brute force attack D) Vegineer cipher

ANSWER: C

Unit 01 - Q048: This is an encryption/decryption key known only to the party or parties that exchange secret messages. A) e-signature B) digital certificate C) private key D) security token

ANSWER: C

Unit 01 - Q077: Which are the most frequently found letters in the English language ? A) e,a B) e,o C) e,t D) e,i

ANSWER: C

Unit 01 - Q079: DES follows A) Hash Algorithm B) Caesars Cipher C) Feistel Cipher Structure D) SP Networks

ANSWER: C

Unit 01 - Q081: The DES algorithm has a key length of A) 128 Bits B) 32 Bits C) 64 Bits D) 16 Bits

ANSWER: C

Unit 01 - Q084: How many rounds does the AES-256 perform? A) 10 B) 12 C) 14 D) 16

ANSWER: C

Unit 01 - Q088: Which of the following is false for ECB mode of operation? i) The Plain text is broken into blocks of size 128 bytes, ii) Blocks can be swapped, repeated, replaced without recipient noticing, iii) Good for short data ,iv) Encryption of each block is done separately using a randomly generated key for each block. A) i) only B) ii) and iii) C) i) and iv) D) i) ii) and iv)

ANSWER: C

Unit 01 - Q095: TRNGs take in an input which is referred to as A) random variable B) external variable C) entropy source D) bit stream

ANSWER: C

U013-Q001: When a user is computing the hash of a message and then encrypting the hash with his private key, he is producing: { A)hash code B)a timestamp C)a message digest D)a digital signature

ANSWER: D

U02-Q001: Which type of cipher is a simple coding system that changes one character or symbol into another? { A)Reverseography B)Steganography C)Transposition D)Substitution

ANSWER: D

U06-Q001: The main reason why Triple-DES was not kept as the only standard for block ciphers and have been replaced by AES is that { A)it has too short key B)it has too long key C)it is patented D)it is slow

ANSWER: D

U09-Q002: Which of the following is based on the idea of using large integer numbers for the basis of asymmetric encryption? { A)ECC B)Diffie-Hellman C)El Gamal D)RSA

ANSWER: D

Unit 01 - Q026: is a round cipher based on the Rijndael algorithm that uses a 128-bit block of data. A) DES B) 3DES C) RC4 D) AES

ANSWER: D

Unit 01 - Q037: In a known plaintext attack the attacker knows A) predetermined selected ciphertext B) one plaintext and one key C) one ciphertext and one key D) plaintext and ciphertext

ANSWER: D

Unit 01 - Q040: What is the biggest advantage of CBC mode of operation A) It can encrypt in parallel different parts of the messages B) It does not need Initialization Vector (IV) C) The Initialization Vector (IV) is secret � so the length of the secret key is doubled D) A ciphertext block depends on all blocks before it

ANSWER: D

Unit 01 - Q080: The DES Algorithm Cipher System consists of ____________rounds (iterations) each with a round key A) 12 B) 18 C) 9 D) 16

ANSWER: D

Unit 01 - Q082: AES uses a ____________ bit block size and a key size of __________ bits. A) 128; 128 or 256 B) 64; 128 or 192 C) 256; 128, 192, or 256 D) 128; 128, 192, or 256

ANSWER: D

Unit 01 - Q089: Which of the following statements are true? i) In the CBC mode, the plaintext block is XORed with previous ciphertext block before encryption; ii) The CTR mode does not require an Initialization Vector; iii) The last block in the CBC mode uses an Initialization Vector; iv) In CBC mode repetitions in plaintext do not show up in ciphertext. A) iii) B) ii) and iv) C) All the Statements are true D) i) ii) and iv)

ANSWER: D

Unit 01 - Q099: Frequency Test is A) a test to determine whether the number of runs of ones and zeros of various lengths is as expected B) a test to detect if a sequence can be significantly compressed without loss of information C) a test for the check of evenness in the 1s and 0s D) a test to determine whether the number of ones and zeros in a sequence is approx the same as in a truely random o/p

ANSWER: D


Conjuntos de estudio relacionados

Chapter 38: Agents to Control Blood Glucose Levels

View Set

public speaking exam 2 (ch 7-11, 15)

View Set

Chapter 12 - The Respiratory System

View Set

KIN 474 - Chapter 12 & 13 Study Notes

View Set