• 1. 

  • field of both cryptography and cryptanalysis
  • study of encryption principles/methods
  • study of principles/methods of deciphering ciphertext without knowing key
  • converting plaintext to ciphertext
  • 2. 
    In which type of encryption is the same key used to encrypt and decrypt data?

  • public
  • asymmetric
  • symmetric
  • private
  • 3. 
    It is a science that applies complexmathematics and logic to design strong encryptionmethods.

  • Cryptosystem
  • Cryptography
  • Encryption
  • 4. 

  • original message
  • coded message
  • algorithm for transforming plaintext to ciphertext
  • info used in cipher known only to sender/receiver
  • 5. 

  • study of principles/methods of deciphering ciphertext without knowing key
  • study of encryption and decryption principles and methods
  • field of both cryptography and cryptanalysis
  • coded message
  • 6. 
    A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?

  • detective
  • preventive
  • masking
  • deterrent
  • 7. 
    One key is used for data encryption and another for data decryption.

  • Symmetric Cryptosystem
  • Asymmetric Cryptosystem
  • Asymmetric Key
  • 8. 

  • Ensure message remains secret during transmission between parties
  • Ensure message is not altered while in transit between communicating partners
  • Verifies sender is who she says she is
  • Proves that nobody but on sender could have sent a particular message
  • 9. 
    The two methods of encrypting data are?

  • Substitution and transposition
  • Block and stream
  • Symmetric and asymmetric
  • DES and AES
  • 10. 
    Data that is in an unencrypted form is referred to as which of the following?

  • plain text
  • crypt text
  • cleartext
  • simpletext
  • 11. 
    Encrypted text that will appear to be a random string.

  • Encryption
  • Plaintext
  • Ciphertext
  • 12. 
    What are three examples of administrative access controls? (Choose three.)

  • encryption
  • hiring practices
  • background checks
  • guard dogs
  • policies and procedures
  • 13. 
    It is pair of algorithms that take a key and convert plaintext to ciphertext andback.

  • Cryptosystem
  • Cryptography
  • Decryption
  • 14. 
    Cryptography supports all of the core principles of information security except

  • Availability
  • Confidentiality
  • Integrity
  • Authenticity
  • 15. 
    What alternative term can be used to describe asymmetric cryptographic algorithms?

  • public key cryptography
  • user key cryptography
  • private key cryptography
  • cipher-text cryptography
  • 16. 
    The only cipher system said to be unbreakable by brute force is

  • AES
  • DES
  • One-time pad
  • Triple DES
  • 17. 
    What type of cryptography uses two keys on both ends i.e a private and a public key?

  • shared
  • asymmetric
  • symmetric
  • open
  • 18. 
    It is also called as private key cryptography.

  • Symmetric Cryptosystem
  • Asymmetric Cryptosystem
  • Decryption Key
  • 19. 
    It is a method used in telecommunication to encode text characters as standardized sequences of two different signal durations, called dots and dashes or dits and dahs.

  • Caesar Cipher
  • Morse Code
  • Venn Diagram
  • 20. 
    What is an important disadvantage of using a public key algorithm compared to a symmetric algorithm?

  • Asymmetric algorithm provides better access control.
  • Asymmetric algorithm is a faster process.
  • Asymmetric algorithm provides nonrepudiation of delivery.
  • Asymmetric algorithm is more difficult to implement.
  • 21. 
    Which three processes are examples of logical access controls? (Choose three.)

  • swipe cards to allow access to a restricted area
  • biometrics to validate physical characteristics
  • firewalls to monitor traffic
  • intrusion detection system (IDS) to watch for suspicious network activity
  • fences to protect the perimeter of a building
  • 22. 

  • coded message
  • original message
  • recovering ciphertext from plaintext
  • field of both cryptography and cryptanalysis
  • 23. 
    In software-based cryptography, software implementations can be easily reverse engineered.

  • TRUE
Report Question