Set Questions With Reviewed
Correct Detailed Answers
New Update!!
1. _______ refers to the mapping of our alphabet to a number of cipher
alphabets.
A. Mono-alphabetic
B. Polyalphabetic
C. Pseudo-random - ANSWER Polyalphabetic
2. _____ is considered to be unbreakable since it only uses its cipher code once. -
ANSWER One-time pad
3. _____ encoding involves 8-bit values and supports up to 256 characters. -
ANSWER ASCII
4. A _____ occurs when two different input values produce the same hash
signature.
A. collision
B. rainbow
C. tunnel - ANSWER collision
,5. _____ is an encoding method with 16-bit values and supports up to 65,536
characters. - ANSWER UTF-16
6. The light-weight symmetric stream cipher Trivium operates with a key size of
______ bits and an initialization vector (IV) of _____ bits.
A. 80; 80
B. 64; 128
C. 128; 64 - ANSWER 80; 80
7. A _____ is a tamper-evident and intrusion-resistant physical device that
safeguards and manages cryptographic keys and provides cryptographic
processing.
A. TPM
B. HSM
C. DES - ANSWER hardware security module (HSM)
8. A _____ is a dedicated processor that handles hardware-level encryption;
allows the use of full disk encryption on a hard drive in a manner that minimizes
the impact on system performance.
A. TPM
B. HSM
C. PRNG - ANSWER trusted platform module (TPM)
9. _____ is a message authentication code (MAC) that can be used to verify the
integrity and authentication of the message. It involves hashing the message with
a secret key, and thus differs from standard hashing, which is purely a one-way
function.
,A. HMAC
B. Rainbow table
C. Key escrow - ANSWER HMAC
10. _____ ciphers make use of a single secret key for both encryption and
decryption. - ANSWER Symmetric
11. Solve by applying the binary XOR function.
11011
10000
A. 11011
B. 10000
C. 01011 - ANSWER 01011
12. Solve by applying the binary AND function.
11011
10000
A. 11011
B. 10000
C. 01011 - ANSWER 10000
13. Solve by applying the binary OR function.
11011
10000
, A. 11011
B. 10000
C. 01011 - ANSWER 11011
14. 15 mod 7 = _____
A. 5
B. 2.14
C. 1 - ANSWER 1
15. 12 mod 7 = _____
A. 5
B. 1.7
C. 1 - ANSWER 5
16. The two types of symmetric ciphers are _____ and _____
A. Block, Stream
B. CTR, DES
C. Active, Passive - ANSWER Block, Stream
17. When encrypting data using asymmetric cryptography, which key should be
shared or distributed to facilitate decryption?
A. Secret key
B. Private key
C. Public key - ANSWER Public key