Chapter 8 Reading Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following most accurately defines encryption? A. Changing a message so it can only be easily read by the intended recipient B. Applying keys to a message to conceal it C. Using complex mathematics to conceal a mesage D. Changing a message using complex mathematics

A. Changing a message so it can only be easily read by the intended recipient

Which of the following is most likely to be true of an encryption method that is advertised as unbreakable? A. It is likely to be exaggerated. B. It may be too expensive for your organization. C. It is probably one you want to use. D. It is probably suitable for military use.

A. It is likely to be exaggerated.

What is the main problem with simple substitution? A. It maintains letter and word frequency. B. It is easily broken with modern computers. C. It is too simple. D. It does not use complex mathematics.

A. It maintains letter and word frequency.

Which of the following is most true regarding new encryption methods? A. Never use them until they have been proven. B. You can use them, but you must be cautious. C. Only use them if they are rated unbreakable. D. Only use them if they are certified.

A. Never use them until they have been proven.

Which of the following methods is available as an add-in for most email clients? A. PGP B. Caesar cipher C. RSA D. DES

A. PGP

What advantage does a symmetric key system using 64-bit blocks have? A. It is fast. B. It is unbreakable. C. It uses asymmetric keys. D. It is complex.

A. It is fast.

What should you be most careful of when looking for an encryption method to use? A. Veracity of the vendor's claims B. How long the algorithm has been around C. Complexity of the algorithm D. Speed of the algorithm

B. How long the algorithm has been around

What size key does a DES system use? A. 128 bit B. 64 bit C. 256 bit D. 56 bit

D. 56 bit

Which of the following is the oldest encryption method discussed in this text? A. PGP B. Multi-alphabet encryption C. Cryptic cipher D. Caesar cipher

D. Caesar ciper

What is PGP? A. Pretty Good Protection, a public key encryption method B. Pretty Good Protection, a symmetric key encryption method C. Pretty Good Privacy, a symmetric key encryption method D. Pretty Good Privacy, a public key encryption method

D. Pretty Good Privacy, a public key encryption method

Which binary mathematical operation can be used for a simple encryption method? A. OR B. Bit swap C. Bit shift D. XOR

D. XOR

Which of the following methods uses a variable-length symmetric key? A. DES B. Blowfish C. Caesar D. RSA

B. Blowfish

Which of the following is an encryption method using two or more different shifts? A. PGP B. Multi-alphabet encryption C. Caesar cipher D. DES

B. Multi-alphabet encryption

Which of the following is most true regarding binary operations and encryption? A. They are only useful as a teaching method. B. They can form a part of viable encryption methods. C. They are completely useless. D. They can provide secure encryption.

B. They can form a part of viable encryption methods.

Which of the following is a symmetric key system using 64-bit blocks? A. PGP B. Blowfish C. DES D. RSA

C. DES

Why is binary mathematical encryption not secure? A. It is too simple. B. It leaves the message intact. C. It does not change letter or word frequency. D. The mathematics of it is flawed.

C. It does not change letter or word frequency.

What type of encryption uses different keys to encrypt and decrypt the message? A. Private key B. Symmetric C. Public key D. Secure

C. Public key

Which of the following is most true regarding certified encryption methods? A. It depends on the level of certification. B. It depends on the source of the certification. C. There is no such thing as certified encryption. D. These are the only methods we should use.

C. There is no such thing as certified encryption.


Set pelajaran terkait

National Exam - Real Estate - CE Shop

View Set

Walking Through and Explaining a DCF; Calculating Free Cash Flow (FCF) - Breaking into Wall Street

View Set

Instruction Set: Addressing Modes and Format

View Set