CSIS 463
Modern Cryptography
LATEST MIDTERM REVIEW
© 2024/2025
,1. Multiple Choice: Which of the following is considered a
symmetric key cryptographic algorithm?
a) RSA
b) ECC
c) AES
d) SHA-256
Correct Answer: c) AES
2. True/False: In asymmetric cryptography, the encryption and
decryption keys are different but related.
Correct Answer: True
3. Fill-in-the-Blank: The ___________ is a cryptographic protocol
that provides communications security over a computer network.
Correct Answer: Transport Layer Security (TLS)
4. Multiple Response: Select all that apply. Which of the following
are goals of cryptography?
a) Confidentiality
b) Integrity
© 2024/2025
, c) Availability
d) Non-repudiation
Correct Answers: a) Confidentiality, b) Integrity, d) Non-
repudiation
5. Multiple Choice: What does the 'P' in 'PKI' stand for?
a) Private
b) Protected
c) Public
d) Personal
Correct Answer: c) Public
6. True/False: Hash functions are used to ensure the integrity of a
message or data file.
Correct Answer: True
7. Fill-in-the-Blank: _________ is a property that ensures that a
party cannot deny the authenticity of their signature on a document
or a message they sent.
Correct Answer: Non-repudiation
© 2024/2025
Modern Cryptography
LATEST MIDTERM REVIEW
© 2024/2025
,1. Multiple Choice: Which of the following is considered a
symmetric key cryptographic algorithm?
a) RSA
b) ECC
c) AES
d) SHA-256
Correct Answer: c) AES
2. True/False: In asymmetric cryptography, the encryption and
decryption keys are different but related.
Correct Answer: True
3. Fill-in-the-Blank: The ___________ is a cryptographic protocol
that provides communications security over a computer network.
Correct Answer: Transport Layer Security (TLS)
4. Multiple Response: Select all that apply. Which of the following
are goals of cryptography?
a) Confidentiality
b) Integrity
© 2024/2025
, c) Availability
d) Non-repudiation
Correct Answers: a) Confidentiality, b) Integrity, d) Non-
repudiation
5. Multiple Choice: What does the 'P' in 'PKI' stand for?
a) Private
b) Protected
c) Public
d) Personal
Correct Answer: c) Public
6. True/False: Hash functions are used to ensure the integrity of a
message or data file.
Correct Answer: True
7. Fill-in-the-Blank: _________ is a property that ensures that a
party cannot deny the authenticity of their signature on a document
or a message they sent.
Correct Answer: Non-repudiation
© 2024/2025