CIS 115 EXAM 2 QUESTIONS AND
ANSWERS 100% PASS
Which of these was NOT a part of the key used to set up an enigma machine to send and
receive messages?
Initial position of rotors
Choice and order of rotors
Orientation of the lights
Plug connections - ANS Orientation of the lights
The enigma machine was used to send encoded messages during which war?
The Civil War
The War of the Roses
World War I
World War II - ANS World War II
The first steps toward cracking the enigma machine were taken by which Polish mathematician
in the 1920s and 1930s?
Bletchley Park
Alan Turing
Marian Rejewski
Stefan Banach - ANS Marian Rejewski
1 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.
,In the video, we saw and example of cryptography performed by wrapping a piece of paper or
leather around a dowel rod. What do we call this device?
Tabula Recta
Polyalphabet
Scytale
Cipher Stick - ANS Scytale
The cryptoquip puzzle found in the newspaper, where each letter is replaced with another in a
message, is an example of what type of cipher?
Tabula Recta
Substitution Cipher
Symmetric Key
Polyalphabetic Cipher - ANS Substitution Cipher
Match the steps of operating the enigma machine below with the correct number for each step
in order.
Encode Message key twice to avoid errors
Set wheels to message key
Operator chooses message key
Set wheels to today's key from codebook
Encrypt and send message - ANS Set wheels to today's key from codebook
Operator chooses message key
Encode Message key twice to avoid errors
Set wheels to today's key from codebook
Encrypt and send message
As described in the video, what was the major weakness that allowed the enigma machine to
eventually be cracked?
A letter would never encrypt to itself
Too many options
2 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.
, Poor policies and procedures
Not enough wheels - ANS A letter would never encrypt to itself
An enigma machine consists of several circular parts, known by what term, that contain 26
inputs and outputs and use electrical current through the complex internal wiring to encode
and decode the message, and increment by one position after each key is pressed?
Keys
Lights
Plugs
Rotors - ANS Rotors
The Bombe was a device developed to simulate a large number of enigma machines. It was
developed under the supervision of which computer science pioneer?
Alan Turing
Claude Shannon
Grace Hopper
Margaret Hamilton - ANS Alan Turing
One example of a polyalphabetic cipher could be created by using a "rectangular tablet" of
letters and an algorithm to jump through the table. Such a rectangular tablet of letters is known
by what name?
Tabula Recta
Scytale
Answer Key
Decoder Table - ANS Tabula Recta
Which type of modern encryption uses the same key to encrypt and decrypt data, which is
primarily seen in file encryption?
Asymmetric Key Encryption
Diffie-Hellman
3 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.
ANSWERS 100% PASS
Which of these was NOT a part of the key used to set up an enigma machine to send and
receive messages?
Initial position of rotors
Choice and order of rotors
Orientation of the lights
Plug connections - ANS Orientation of the lights
The enigma machine was used to send encoded messages during which war?
The Civil War
The War of the Roses
World War I
World War II - ANS World War II
The first steps toward cracking the enigma machine were taken by which Polish mathematician
in the 1920s and 1930s?
Bletchley Park
Alan Turing
Marian Rejewski
Stefan Banach - ANS Marian Rejewski
1 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.
,In the video, we saw and example of cryptography performed by wrapping a piece of paper or
leather around a dowel rod. What do we call this device?
Tabula Recta
Polyalphabet
Scytale
Cipher Stick - ANS Scytale
The cryptoquip puzzle found in the newspaper, where each letter is replaced with another in a
message, is an example of what type of cipher?
Tabula Recta
Substitution Cipher
Symmetric Key
Polyalphabetic Cipher - ANS Substitution Cipher
Match the steps of operating the enigma machine below with the correct number for each step
in order.
Encode Message key twice to avoid errors
Set wheels to message key
Operator chooses message key
Set wheels to today's key from codebook
Encrypt and send message - ANS Set wheels to today's key from codebook
Operator chooses message key
Encode Message key twice to avoid errors
Set wheels to today's key from codebook
Encrypt and send message
As described in the video, what was the major weakness that allowed the enigma machine to
eventually be cracked?
A letter would never encrypt to itself
Too many options
2 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.
, Poor policies and procedures
Not enough wheels - ANS A letter would never encrypt to itself
An enigma machine consists of several circular parts, known by what term, that contain 26
inputs and outputs and use electrical current through the complex internal wiring to encode
and decode the message, and increment by one position after each key is pressed?
Keys
Lights
Plugs
Rotors - ANS Rotors
The Bombe was a device developed to simulate a large number of enigma machines. It was
developed under the supervision of which computer science pioneer?
Alan Turing
Claude Shannon
Grace Hopper
Margaret Hamilton - ANS Alan Turing
One example of a polyalphabetic cipher could be created by using a "rectangular tablet" of
letters and an algorithm to jump through the table. Such a rectangular tablet of letters is known
by what name?
Tabula Recta
Scytale
Answer Key
Decoder Table - ANS Tabula Recta
Which type of modern encryption uses the same key to encrypt and decrypt data, which is
primarily seen in file encryption?
Asymmetric Key Encryption
Diffie-Hellman
3 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.