Chapter 8- Cybersecurity
What size key does a DES system use?
56 bit
What advantage does a symmetric key system using 64-bit blocks have?
It is fast.
Which of the following is an encryption method using two or more different shifts?
Multi-alphabet encryption
Which of the following is most likely to be true of an encryption method that is advertised as unbreakable?
It is likely to be exaggerated.
What is the main problem with simple substitution?
It maintains letter and word frequency.
Which of the following is most true regarding new encryption methods?
Never use them until they have been proven.
Which of the following methods is available as an add-in for most email clients?
PGP
What is PGP?
Pretty Good Privacy, a public key encryption method
What type of encryption uses different keys to encrypt and decrypt the message?
Public key
Which of the following is most true regarding certified encryption methods?
There is no such thing as certified encryption.
Which of the following is most true regarding binary operations and encryption?
They can form a part of viable encryption methods.
Which binary mathematical operation can be used for a simple encryption method?
XOR
What should you be most careful of when looking for an encryption method to use?
How long the algorithm has been around
Why is binary mathematical encryption not secure?
It does not change letter or word frequency.
Which of the following methods uses a variable-length symmetric key?
Blowfish
Which of the following is the oldest encryption method discussed in this text?
Caesar cipher
Which of the following most accurately defines encryption?
Changing a message so it can only be easily read by the intended recipient
Which of the following is a symmetric key system using 64-bit blocks?
DES