Multiple Choice1. Encryption protects information by presenting which of the following?A. RiddleB. PuzzleC. Key
D. Bug
2. An algorithm is a type of:
A. procedure.
B. security principle.
C. readable data.
D. unreadable data.
3. An encryption algorithm that uses the same key for both encryption and decryption is:
A. symmetric.
B. asymmetric.
C. ciphertext.
D. None of these is correct.
4. The type of cipher that rearranges the text of a message is called:
A. substitution.
B. asymmetric.
C. AES.
D. transposition.
5. True or False? The two primary types of symmetric algorithms are public and cipher.
Multiple Selection
6. Bob and Kevin are both using crypto to communicate with other people. Bob doesn't want Kevin eavesdropping on his messages, and vice versa. They each need to choose algorithms and keys. Which of the following choices will protect one from eavesdropping by the other? Select all that apply.
A. Use the same algorithm and the same key.
B. Use different algorithms and the same key.
C. Use the same algorithm and different keys.
D. Use different algorithms and different keys.
Fill-in-the-Blank
7. Encryption transfers readable plaintext into _____________ using secret information called a(n) ________.
Multiple Choice
8. Which cipher replaces A with D and B with E?
A. Confederate
B. Potter
C. Caesar
D. Vigenère
Answer:
9. True or False? An encryption application program, from a user's point of view, protects a file with a memorized password.
Multiple Choice
10. After encrypting a plaintext file and saving its ciphertext in a new file, what should the file encryption program do next? Select the safest alternative.
A. The program deletes the plaintext file.
B. The program writes zeroes over the data at the beginning of the plaintext file.
C. The program writes zeroes over every data block in the plaintext file.
D. The program writes zeroes over the file's directory entry.
11. Which of the following software can encrypt individual files? Select all that apply.
A. Windows built-in encryption
B. VeraCrypt
C. PKZIP
D. PGP
12. AES was introduced in what year?
A. 2002
B. 1989
C. 2007
D. 1975
13. If we combine "10101" with "01011" using Exclusive Or, which result do we get?
A. 11110
B. 100000
C. 00001
D. 100001
Fill-in-the-Blank
14. A(n) __________ cipher is an algorithm that generates the _____________ stream, a hard-to-predict sequence of binary.
Multiple Choice
15. Alice transmits a message to Bob using a stream cipher. During transmission, an error causes a single bit in the ciphertext to change. How does this affect the decrypted message?
A. The decryption process corrects the error.
B. The decrypted message contains a 1-bit error in the same location.
C. The message is readable up to the bit containing the error and scrambled after that point.
D. The entire message is unreadable after it is decrypted.
16. Briefly explain the difference between deleting a file from a computer's hard disk and overwriting the file.