100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ECES Practice Quiz (2022/2023) Rated A+

Rating
-
Sold
-
Pages
4
Grade
A+
Uploaded on
11-07-2023
Written in
2022/2023

a data concealment method for covert communications that makes use of LSB replacement <<Ans>> Steganography 12 % 5 Modulus Math <<Ans>> 2 Symmetrical encryption is expressed mathematically as <<Ans>> C = E(k,p) Tiger Hash Value <<Ans>> 192-bit SHA256 Hash Value <<Ans>> 128-bit FORK256 Hash Value <<Ans>> 256-bit SHA1 Hash Value <<Ans>> 160-bit GOST Hash Value <<Ans>> 256-bit MD5 Hash Value <<Ans>> 128-bit RIPEMD-160 Hash Value <<Ans>> 160-bit AES Symmetric Block Cipher key and block size <<Ans>> 128-bit blocks: 128, 192 or 256 bit key IDEA Symmetric Block Cipher key and block size <<Ans>> 64-bit blocks; 128 bit key DES Symmetric Block Cipher key and block size <<Ans>> 64-bit blocks; 56 bit key Blowfish Symmetric Block Cipher key and block size <<Ans>> 64-bit blocks; 32-448 bit key Twofish Symmetric Block Cipher key and block size <<Ans>> 128-bit blocks; 1-256 bit key Skipjack Symmetric Block Cipher key and block size <<Ans>> 64-bit blocks; 80 bit key Serpent Symmetric Block Cipher key and block size <<Ans>> 128 bit blocks; 128, 192 or 256 bit key Asymmetric encryption algorithms <<Ans>> RSA, ECC, DSA Symmetric stream ciphers <<Ans>> FISH, PIKE, RC4 Hash algorithms <<Ans>> FORK256, MD5, GOST, RIPEMD-160 Viable options for key exchange <<Ans>> DH, ECDH, MQV 32-round symmetric block ciphers <<Ans>> Skipjack and Serpent Which asymmetric encryption algorithm leverages characteristics of prime numbers and utilizes variable key lengths? <<Ans>> RSA Which equation represents the encryption process for RSA? <<Ans>> Me % n How many rounds are used in AES encryption? <<Ans>> 10, 12 or 14 Of the two processes used in symmetric key cryptography, which involves XORing the plaintext message with the key? <<Ans>> Substitution Of the two processes used in symmetric key cryptography, which involves swapping blocks of the text? <<Ans>> Transposition An instance where two different pieces of data are hashed separately, but both result in a single identical hash value is described by what term? <<Ans>> Collision An instance where different encryption keys generate the same ciphertext from the same plaintext message is described by what term? <<Ans>> Clustering Symmetric decryption is expressed mathematically as <<Ans>> P = E(k,c) Instances where a change in one bit in the plaintext would affect all the bits of the ciphertext is best described by what term? <<Ans>> Avalanche Instances where a change in one bit in the plaintext would affect multiple characters in the ciphertext is best describe by what term? <<Ans>> Diffusion What is the standard for digital certificates? <<Ans>> X.509 If timeliness is a priority factor for checking revocation status, which option would you prefer? <<Ans>> OCSP When looking for an encryption scheme where speed is of utmost importance, which would you prefer? <<Ans>> Symmetric When looking for an encryption solution for the data on your computer where full disk encryption is of utmost importance, which would you prefer? <<Ans>> Bitlocker What Federal Information Processing Standard pertains to DSA? <<Ans>> FIPS 186

Show more Read less
Institution
ECES Practice
Module
ECES Practice








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ECES Practice
Module
ECES Practice

Document information

Uploaded on
July 11, 2023
Number of pages
4
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$10.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
Mawseron
4.0
(1)

Get to know the seller

Seller avatar
Mawseron University of the People
View profile
Follow You need to be logged in order to follow users or courses
Sold
6
Member since
2 year
Number of followers
3
Documents
198
Last sold
1 year ago

latest updated documents, correct, verified & graded A study materials

4.0

1 reviews

5
0
4
1
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions