ECES Practice Quiz (2022/2023) Rated A+
a data concealment method for covert communications that makes use of LSB replacement <<Ans>> Steganography 12 % 5 Modulus Math <<Ans>> 2 Symmetrical encryption is expressed mathematically as <<Ans>> C = E(k,p) Tiger Hash Value <<Ans>> 192-bit SHA256 Hash Value <<Ans>> 128-bit FORK256 Hash Value <<Ans>> 256-bit SHA1 Hash Value <<Ans>> 160-bit GOST Hash Value <<Ans>> 256-bit MD5 Hash Value <<Ans>> 128-bit RIPEMD-160 Hash Value <<Ans>> 160-bit AES Symmetric Block Cipher key and block size <<Ans>> 128-bit blocks: 128, 192 or 256 bit key IDEA Symmetric Block Cipher key and block size <<Ans>> 64-bit blocks; 128 bit key DES Symmetric Block Cipher key and block size <<Ans>> 64-bit blocks; 56 bit key Blowfish Symmetric Block Cipher key and block size <<Ans>> 64-bit blocks; 32-448 bit key Twofish Symmetric Block Cipher key and block size <<Ans>> 128-bit blocks; 1-256 bit key Skipjack Symmetric Block Cipher key and block size <<Ans>> 64-bit blocks; 80 bit key Serpent Symmetric Block Cipher key and block size <<Ans>> 128 bit blocks; 128, 192 or 256 bit key Asymmetric encryption algorithms <<Ans>> RSA, ECC, DSA Symmetric stream ciphers <<Ans>> FISH, PIKE, RC4 Hash algorithms <<Ans>> FORK256, MD5, GOST, RIPEMD-160 Viable options for key exchange <<Ans>> DH, ECDH, MQV 32-round symmetric block ciphers <<Ans>> Skipjack and Serpent Which asymmetric encryption algorithm leverages characteristics of prime numbers and utilizes variable key lengths? <<Ans>> RSA Which equation represents the encryption process for RSA? <<Ans>> Me % n How many rounds are used in AES encryption? <<Ans>> 10, 12 or 14 Of the two processes used in symmetric key cryptography, which involves XORing the plaintext message with the key? <<Ans>> Substitution Of the two processes used in symmetric key cryptography, which involves swapping blocks of the text? <<Ans>> Transposition An instance where two different pieces of data are hashed separately, but both result in a single identical hash value is described by what term? <<Ans>> Collision An instance where different encryption keys generate the same ciphertext from the same plaintext message is described by what term? <<Ans>> Clustering Symmetric decryption is expressed mathematically as <<Ans>> P = E(k,c) Instances where a change in one bit in the plaintext would affect all the bits of the ciphertext is best described by what term? <<Ans>> Avalanche Instances where a change in one bit in the plaintext would affect multiple characters in the ciphertext is best describe by what term? <<Ans>> Diffusion What is the standard for digital certificates? <<Ans>> X.509 If timeliness is a priority factor for checking revocation status, which option would you prefer? <<Ans>> OCSP When looking for an encryption scheme where speed is of utmost importance, which would you prefer? <<Ans>> Symmetric When looking for an encryption solution for the data on your computer where full disk encryption is of utmost importance, which would you prefer? <<Ans>> Bitlocker What Federal Information Processing Standard pertains to DSA? <<Ans>> FIPS 186
Written for
- Institution
- ECES Practice
- Module
- ECES Practice
Document information
- Uploaded on
- July 11, 2023
- Number of pages
- 4
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
eces practice quiz 20222023 rated a