ECES PRACTICE QUESTIONS & ANSWERS
How did the ATBASH cipher work?
a. By shifting each letter a certain number of spaces
b. By Multi alphabet substitution
c. By rotating text a given number of spaces
d. By substituting each letter for the letter from the opposite end of the alphabet (i.e. A
becomes Z, B becomes Y, etc.) - Answer -D
DES has a key space of what?
a. 2
128
b. 2192
c. 2
56
d. 264 - Answer -C
Which of the following are valid key sizes for AES (choose three)?
a. 56
b. 64
c. 128
d. 192
e. 256
f. 512 - Answer -C, D, E
Which of the following algorithms uses three different keys to encrypt the plain text?
a. AES
b. 3DES
c. Blowfish
d. Skipjack - Answer -B
Which of the following is a block cipher?
a. AES
b. RC4
c. DH
d. RSA - Answer -A
Which of the following is a type of encryption that has two different keys. One key can
encrypt
the message and the other key can only decrypt it?
a. Symmetric
b. Asymmetric
c. Block cipher
d. Stream cipher - Answer -B
, Which of the following is an asymmetric cipher?
a. DES
b. RC4
c. RSA
d. AES - Answer -C
A cipher is defined as what
a. Any algorithm used in cryptography
b. The key used to encrypt a message
c. The algorithm(s) needed to encrypt and decrypt a message
d. Encrypted text - Answer -C
Which of the following is not an asymmetric system?
a. DH
b. AES
c. RSA
d. PGP - Answer -B
John is going to use RSA to encrypt a message to Joan. What key should he use?
a. Joan's public key
b. A shared key
c. Joan's private key
d. A random key - Answer -A
What advantage do symmetric algorithms have over asymmetric algorithms
a. They are faster
b. They are more secure
c. It is easier to exchange keys
d. It is easier to implement them in software - Answer -A
Which of the following is generally true about key sizes?
a. Larger key sizes increase security
b. Smaller key sizes increase security
c. Key size is irrelevant to security
d. Key sizes must be more than 256 bits to be secure - Answer -A
A _____ is a function is not reversible.
a. Stream cipher
b. Asymmetric cipher
c. Hash
d. Block Cipher - Answer -C
Which of the following is a protocol for exchanging keys?
a. EC
b. RSA
How did the ATBASH cipher work?
a. By shifting each letter a certain number of spaces
b. By Multi alphabet substitution
c. By rotating text a given number of spaces
d. By substituting each letter for the letter from the opposite end of the alphabet (i.e. A
becomes Z, B becomes Y, etc.) - Answer -D
DES has a key space of what?
a. 2
128
b. 2192
c. 2
56
d. 264 - Answer -C
Which of the following are valid key sizes for AES (choose three)?
a. 56
b. 64
c. 128
d. 192
e. 256
f. 512 - Answer -C, D, E
Which of the following algorithms uses three different keys to encrypt the plain text?
a. AES
b. 3DES
c. Blowfish
d. Skipjack - Answer -B
Which of the following is a block cipher?
a. AES
b. RC4
c. DH
d. RSA - Answer -A
Which of the following is a type of encryption that has two different keys. One key can
encrypt
the message and the other key can only decrypt it?
a. Symmetric
b. Asymmetric
c. Block cipher
d. Stream cipher - Answer -B
, Which of the following is an asymmetric cipher?
a. DES
b. RC4
c. RSA
d. AES - Answer -C
A cipher is defined as what
a. Any algorithm used in cryptography
b. The key used to encrypt a message
c. The algorithm(s) needed to encrypt and decrypt a message
d. Encrypted text - Answer -C
Which of the following is not an asymmetric system?
a. DH
b. AES
c. RSA
d. PGP - Answer -B
John is going to use RSA to encrypt a message to Joan. What key should he use?
a. Joan's public key
b. A shared key
c. Joan's private key
d. A random key - Answer -A
What advantage do symmetric algorithms have over asymmetric algorithms
a. They are faster
b. They are more secure
c. It is easier to exchange keys
d. It is easier to implement them in software - Answer -A
Which of the following is generally true about key sizes?
a. Larger key sizes increase security
b. Smaller key sizes increase security
c. Key size is irrelevant to security
d. Key sizes must be more than 256 bits to be secure - Answer -A
A _____ is a function is not reversible.
a. Stream cipher
b. Asymmetric cipher
c. Hash
d. Block Cipher - Answer -C
Which of the following is a protocol for exchanging keys?
a. EC
b. RSA