ACTUAL Exam Questions and CORRECT
Answers
What type of encryption uses different keys to encrypt and decrypt the message?
+Secure
+Asymmetric
+Private key
+Symmetric - CORRECT ANSWER - Asymmetric
Asymmetric cryptography, also known as public key cryptography, uses public and private keys
to encrypt and decrypt data.
The most widely used asymmetric encryption algorithm is what?
+Caesar Cipher
+Vigenere
+RSA
+DES - CORRECT ANSWER - RSA
The RSA encryption algorithm is one of the most widely used public key encryption algorithms
that have ever been invented. It was created by the three scientists Ronald Rivest, Adi Shamir,
and Leonard Adleman in 1977, and today it is increasingly being used in the network area.
Original, unencrypted information is referred to as ____.
+text
+plaintext
,+cleantext
+ciphertext - CORRECT ANSWER - Plaintext
Plaintext is a term used in cryptography that refers to a message before encryption or after
decryption. That is, it is a message in a form that is easily readable by humans. Encryption is the
process of obscuring messages to make them unreadable in the absence special knowledge
Which of the following is not an asymmetric system?
+SSL
+DES
+PGP
+RSA - CORRECT ANSWER - DES
The Data Encryption Standard is a symmetric-key algorithm for the encryption of electronic
data. Although now considered insecure, it was highly influential in the advancement of modern
cryptography.
In order for User A to send User B an encrypted message that only User B can read, User A must
encrypt message with which of the following keys?
+User B's public key
+User B's private key
+User A's public key
+User A's private key - CORRECT ANSWER - USER B's Public Key
Public key cryptography, or asymmetrical cryptography, is any cryptographic system that uses
pairs of keys: public keys which may be disseminated widely, and private keys which are known
only to the owner
, The greatest weakness with symmetric algorithms is _____.
+The problem of key exchange
+The problem of generating keys
+They are slower than asymmetric
+They are less secure than asymmetric - CORRECT ANSWER - The Problem of Key
exchange
The biggest problem with symmetric key encryption is that you need to have a way to get the key
to the party with whom you are sharing data.
Which of the following is generally true about block sizes?
+Block size is irrelevant to security
+Block sizes must be more than 256 bits to be secure
+Larger block sizes increase security
+Smaller block sizes increase security - CORRECT ANSWER - Larger Block sizes increase
security
Larger block sizes do increase security, however at the cost of processing power and encryption
time.
A _____ is a function that takes a variable-size input m and returns a fixed-size string.
+Hash
+Symmetric cipher
+Feistel
+Asymmetric cipher - CORRECT ANSWER - Hash