CIST1601-New Chapter 8 Review Questions

Ace your homework & exams now with Quizwiz!

8. What is PGP? A) Pretty Good Privacy, a public key encryption method B) Pretty Good Protection, a public key encryption method C) Pretty Good Privacy, a symmetric key encryption method D) Pretty Good Protection, a symmetric key encryption method

A) Pretty Good Privacy, a public key encryption method

1. Which of the following most accurately defines encryption? A) changing a message so it can only be easily read by the intended recipient. B) using complex mathematics to conceal a message. C) changing a message using complex mathematics. D) applying keys to a message to conceal it.

A) changing a message so it can only be easily read by the intended recipient.

15. What should you be most careful of when looking for an encryption method to use? A) complexity of the algorithm B) veracity of the vendor's claim C) speed of the algorithm D) how long the algorithm has been around

A) complexity of the algorithm

14. Which of the following methods uses a variable-length symmetric key? A) Blowfish B) Caesar C) DES D) RSA

A) Blowfish

6. Why is binary mathematical encryption not secure? A) It does not change letter or word frequency. B) It leaves the message intact. C) It is too simple. D) The mathematics of it is flawed.

A) It does not change letter or word frequency.

11. What advantage does a symmetric key system using 64-bit blocks have? A) It is fast B) It is unbreakable C) It uses asymmetric keys D) It is complex

A) It is fast

19. Which of the following is the oldest protocol used by VPN? A) PPTP B) L2TP C) IPSec D) SPAP

A) PPTP

20. Which of the following is used by PPTP to encrypt packets? A) Microsoft Point-to-Point Encryption B) Layer 2 Tunneling Protocol C) Extensible Authentication Protocol D) Challenge Handshake Authentication Protocol

A) Microsoft Point-to-Point Encryption

10. Which of the following is a symmetric key system using 64-bit blocks? A) RSA B) DES C) PGP D) Blowfish

B) DES

7. Which of the following is most true regarding binary operations and encryption? A) They are completely useless B) They can form a part of viable encryption methods C) They are only useful as a teaching method D) They can provide secure encryption

B) They can form a part of viable encryption methods

Which of the following is most true regarding new encryption methods? A) Never use them until they have been proven. B) You can use them, but you must be cautious. C) Only use them if they are certified. D) Only use them if they are rated unbreakable.

B) You can use them, but you must be cautious.

13. What type of encryption uses different keys to encrypt and decrypt the message? A) private key B) public key C) symmetric D) secure

B) public key

12. What size key does a DES system use? A) 64 bit B) 128 bit C) 56 bit D) 256 bit

C) 56 bit

2. Which of the following is the oldest encryption method discussed in this text? A) PGP B) Multi-alphabet encryption C) Caesar cipher D) Cryptic cipher

C) Caesar cipher

16. Which of the following is most likely to be true of an encryption method that is advertised as unbreakable? A) It is probably suitable for military use. B) It may be too expensive for your organization C) It is likely to be exaggerated D) It is probably one you want to use

C) It is likely to be exaggerated

5. Which binary mathematical operation can be used for a simple encryption method? A) bit shift B) OR C) XOR D) bit swap

C) XOR

3. What is the main problem with simple substitution? A) It does not use complex mathematics B) It is easily broken with modern computers C) It is too simple D) It maintains letter and word frequency

D) It maintains letter and word frequency

4. Which of the following is an encryption method using two or more different shifts? A) Caesar cipher B) Multi-alphabet encryption C) DES D) PGP

D) PGP

9. Which of the following methods is available as an add-in for most e-mail clients? A) DES B) RSA C) Caesar cipher D) PGP

D) PGP

17. Which of the following is most true regarding certified encryption methods? A) These are the only methods you should use. B) It depends on the level of certification. C) It depends on the source of the certification. D) There is not such thing as certified encryption.

D) There is not such thing as certified encryption.


Related study sets

Physics: Rotational, Projectile, Satellite Motion, Gravity

View Set

Rock and Roll Midterm Studyguide

View Set

OB Chapt 10 Fetal Development & Genetics

View Set

Delegation subtopic in Leadership/Management Evolve Adaptive Quizzing

View Set

Adding and Subtracting Polynomials - Quiz

View Set

Alcohol, Drugs, and Human Behavior Review Exam 3

View Set