Computer Forensics Midterm
What is the key length used for DES? A. 56 B. 64 C. 128 D. 256
A. 56
How many rounds does DES have? A. 64 B. 56 C. 16 D. 4
C. 16
Which of the following encryption algorithms uses three key ciphers in a block system and uses the Rijndael algorithm? A. DES B. RSA C. AES D. NSA
C. AES
The Caesar cipher is the oldest known encryption method. A. True B. False
A. True
In steganography, the ________ is the data to be covertly communicated. In other words, it is the message you want to hide. A. payload B. carrier C. signal D. channel
A. payload
3. What type of encryption uses a different key to encrypt the message than it uses to decrypt the message? A. Private key B. Asymmetric C. Symmetric D. Secure
B. Asymmetric
Which of the following is an example of a multialphabet cipher? A. Caesar B. Vigenère C. Atbash D. ROT13
B. Vigenère
In steganography, the ________ is the stream or file into which the data is hidden. A. payload B. carrier C. signal D. channel
B. carrier
An improvement on the Caesar cipher that uses more than one shift is called ________. A. DES encryption B. multialphabet substitution C. IDEA D. Triple DES
B. multialphabet substitution
The most common way steganography is accomplished is via ________. A. MSB B. ASB C. RSB D. LSB
D. LSB
Which of the following is an asymmetric cryptography algorithm invented by three mathematicians in the 1970s? A. PGP B. DES C. DSA D. RSA
D. RSA
Hiding messages inside another medium is referred to as ________. A. cryptography B. cryptology C. steganalysis D. steganography
D. steganography