ANSWERS|LATEST
Which of the following hides the existence of information?
a. Decryption
b. Steganography
c. Ciphering
d. Encryption - ANSWER b. Steganography
Cryptography can prevent an individual from fraudulently reneging on an action. What is this
known as?
a. Nonrepudiation
b. Repudiation
c. Obfuscation
d. Integrity - ANSWER a. Nonrepudiation
Brielle is researching substitution ciphers. She came across a cipher in which the entire
alphabet was rotated 13 steps. What type of cipher is this?
a. XOR
b. ROT13
c. Alphabetic
d. XAND13 - ANSWER b. ROT13
1
, Which of the following is FALSE about "security through obscurity"?
a. Proprietary cryptographic algorithms are an example.
b. It can only provide limited security.
c. It attempts to hide the existence from outsiders.
d. It is essentially impossible. - ANSWER b. It can only provide limited security.
What is low latency?
a. The time between when a byte is input into a cryptographic cipher and when the output is
obtained.
b. The delay between when a substitution cipher decrypts the first block and when it finishes
with the last block.
c. The requirements for an IoT device that is using a specific network.
d. A low-power source requirement of a sensor. - ANSWER a. The time between when
a byte is input into a cryptographic cipher and when the output is obtained.
What are public key systems that generate different random public keys for each session?
a. perfect forward secrecy
b. Public Key Exchange (PKE)
c. Diffie-Hellman (DH)
d. Elliptic Curve Diffie-Hellman (ECDH) - ANSWER a. perfect forward secrecy
What is data called that is to be encrypted by inputting it into a cryptographic algorithm?
a. Plaintext
b. Byte-text
c. Ciphertext
d. Cleartext - ANSWER a. Plaintext
Which of these is NOT a basic security protection for information that cryptography can
provide?
2
Which of the following hides the existence of information?
a. Decryption
b. Steganography
c. Ciphering
d. Encryption - ANSWER b. Steganography
Cryptography can prevent an individual from fraudulently reneging on an action. What is this
known as?
a. Nonrepudiation
b. Repudiation
c. Obfuscation
d. Integrity - ANSWER a. Nonrepudiation
Brielle is researching substitution ciphers. She came across a cipher in which the entire
alphabet was rotated 13 steps. What type of cipher is this?
a. XOR
b. ROT13
c. Alphabetic
d. XAND13 - ANSWER b. ROT13
1
, Which of the following is FALSE about "security through obscurity"?
a. Proprietary cryptographic algorithms are an example.
b. It can only provide limited security.
c. It attempts to hide the existence from outsiders.
d. It is essentially impossible. - ANSWER b. It can only provide limited security.
What is low latency?
a. The time between when a byte is input into a cryptographic cipher and when the output is
obtained.
b. The delay between when a substitution cipher decrypts the first block and when it finishes
with the last block.
c. The requirements for an IoT device that is using a specific network.
d. A low-power source requirement of a sensor. - ANSWER a. The time between when
a byte is input into a cryptographic cipher and when the output is obtained.
What are public key systems that generate different random public keys for each session?
a. perfect forward secrecy
b. Public Key Exchange (PKE)
c. Diffie-Hellman (DH)
d. Elliptic Curve Diffie-Hellman (ECDH) - ANSWER a. perfect forward secrecy
What is data called that is to be encrypted by inputting it into a cryptographic algorithm?
a. Plaintext
b. Byte-text
c. Ciphertext
d. Cleartext - ANSWER a. Plaintext
Which of these is NOT a basic security protection for information that cryptography can
provide?
2