• 1. 
    The following word was encrypted using a Caesar cipher with a shift of 2: ecguct. What word is it?

  • julius
  • caesar
  • romans
  • cipher
  • 2. 
    _______ is the science and art of transforming messages to make them secure and immune to attacks.

  • Cryptography
  • Cryptoanalysis
  • neither Cryptography nor Cryptoanalysis
  • either Cryptography or Cryptoanalysis
  • 3. 
    A(n) ______ algorithm transforms cipher text to plain text.

  • Encryption
  • Decryption
  • 4. 
    A method for determining a solution to a problem by sequentially testing all possible solutions.

  • brute force
  • relative frequency
  • cipher
  • paired keys
  • 5. 
    A Caesar cipher is an example of a ______________________.

  • transposition cipher
  • bimodal cipher
  • substitution cipher
  • substantial cipher
  • 6. 
    What machine was used during WWII to encrypt and decrypt German messages?

  • Enigma
  • Atbash
  • Secret
  • Puzzler
  • 7. 
    A 4X5 matrix cipher was used to encrypt "good morning everyone". What will it be output?

  • GMIVOOONENORGREDNEY
  • GOGYOREOONVNDIEEMNR
  • GDRNVYEOMNGEOOOIERN
  • 8. 
    Encrypt the word alphabet using a Caesar cipher with a shift of 3

  • DVSDULQV
  • DOOFOHDU
  • DOSKDEHW
  • DORQHBHV
  • 9. 
    Who was the first known user of the Caesar Cipher?

  • Caesar Romanus
  • Julius Caesar
  • Alan Turing
  • There isn't one
  • 10. 
    The _______ is a number or a set of numbers on which the cipher operates.

  • secret
  • cipher
  • key
  • none of the mentioned
  • 11. 
    What was the name of the man who led the team that cracked the German's "Enigma Code" in WW2?

  • Tim Berners-Lee
  • Alan Turing
  • Stephen Hawking
  • Bill Gates
  • 12. 
    An encryption algorithm transforms plain text into:

  • Cipher text
  • Simple Text
  • Empty Text
  • Plain Text
  • 13. 
    What is encryption?

  • When you put data / text into code making it difficult to read or understand.
  • A secret or disguised way of writing; a code.
  • A formal language designed to communicate instructions to a machine
  • What is put in, taken in, or operated on by any process or system.
  • 14. 
    The process of converting a ciphertext into plaintext.

  • encryption
  • decryption
  • plaintext
  • cryptography
  • 15. 
    In Cryptography, the original message, before being transformed, is called

  • Simple Text
  • Plain Text
  • Cipher Text
  • Filled Text
  • 16. 
    A cipher is _________________________.

  • a person who makes up secret codes
  • an algorithm that is used to scramble text so that it can be passed in secret
  • a lock that can be used to lock a message in a lock box
  • any puzzle, such as a crossword or Sudoku puzzle
  • 17. 
    By encrypting "Hello world" using a rail fence cipher of size 3, the output will be:

  • LDWORLO_HEL
  • HLWLEOODL_R
  • HORE_LLWDLO
  • LOLWDE_LHOR
Report Question
warning
access_time
  Time