WGU D334 -CHAPTER 1 KNOWLEDGE CHECK
QUESTIONS WITH ANSWERS
An encoding technique called _____ converts characters into a series of dots
and dashes.
The Morse Code
Which kind of computer architecture uses the lowest memory address to store
the least important byte?
Tiny Endian
What would be the events that comprise the potential outcome of a coin toss in
terms of probability?
mutually exclusive
In which straightforward cipher technique is a single mapping from a given
alphabet to a cipher alphabet created?
mono-alphabetic
During the encryption process, which cipher uses a grid that converts letters into
numerical values?
BIFID
Choose the methods from the list below that can be applied to binary data error
detection in order to support the CIA triad's integrity pillar. Choose all that
apply.
Checksum
Check for Cyclic Redundancy (CRC)
, What kind of values are mapped to characters in ASCII encoding? Choose all
that apply.
Binary
Decimal
Hex
Which kind of computer architecture uses the lowest memory address to store
the most important byte?
Large Endian
When preparing the table for the Playfair cipher, you should make sure that no
letters are repeated and that you leave off which matrix letter?
A ____ use a random procedure to produce a real random number. One method
is to keep an eye on the mouse pointer's movements on the screen or the
intervals between keystrokes. Overall, the approach is aperiodic and non-
deterministic, although it is often slow, particularly when human involvement is
involved.
Generator of true random numbers (TRNG)
The ______ cipher writes a message sequentially across several rails in an
attempt to jumble plaintext characters.
Fence with rails
QUESTIONS WITH ANSWERS
An encoding technique called _____ converts characters into a series of dots
and dashes.
The Morse Code
Which kind of computer architecture uses the lowest memory address to store
the least important byte?
Tiny Endian
What would be the events that comprise the potential outcome of a coin toss in
terms of probability?
mutually exclusive
In which straightforward cipher technique is a single mapping from a given
alphabet to a cipher alphabet created?
mono-alphabetic
During the encryption process, which cipher uses a grid that converts letters into
numerical values?
BIFID
Choose the methods from the list below that can be applied to binary data error
detection in order to support the CIA triad's integrity pillar. Choose all that
apply.
Checksum
Check for Cyclic Redundancy (CRC)
, What kind of values are mapped to characters in ASCII encoding? Choose all
that apply.
Binary
Decimal
Hex
Which kind of computer architecture uses the lowest memory address to store
the most important byte?
Large Endian
When preparing the table for the Playfair cipher, you should make sure that no
letters are repeated and that you leave off which matrix letter?
A ____ use a random procedure to produce a real random number. One method
is to keep an eye on the mouse pointer's movements on the screen or the
intervals between keystrokes. Overall, the approach is aperiodic and non-
deterministic, although it is often slow, particularly when human involvement is
involved.
Generator of true random numbers (TRNG)
The ______ cipher writes a message sequentially across several rails in an
attempt to jumble plaintext characters.
Fence with rails