BANK 2026 COMPLETE SOLUTIONS
VERIFIED
◍ Cryptography can prevent an individual from fraudulently reneging
on an action. What is this known as?
a. Nonrepudiation
b. Repudiation
c. Obfuscation
d. Integrity. Answer: a. Nonrepudiation
◍ Brielle is researching substitution ciphers. She came across a cipher
in which the entire alphabet was rotated 13 steps. What type of cipher
is this?
a. XOR
b. ROT13
c. Alphabetic
d. XAND13. Answer: b. ROT13
◍ Which of the following is FALSE about "security through
obscurity"?
a. Proprietary cryptographic algorithms are an example.
b. It can only provide limited security.
c. It attempts to hide the existence from outsiders.
, d. It is essentially impossible.. Answer: b. It can only provide limited
security.
◍ What is low latency?
a. The time between when a byte is input into a cryptographic cipher
and when the output is obtained.
b. The delay between when a substitution cipher decrypts the first
block and when it finishes with the last block.
c. The requirements for an IoT device that is using a specific network.
d. A low-power source requirement of a sensor.. Answer: a. The time
between when a byte is input into a cryptographic cipher and when
the output is obtained.
◍ What are public key systems that generate different random public
keys for each session?
a. perfect forward secrecy
b. Public Key Exchange (PKE)
c. Diffie-Hellman (DH)
d. Elliptic Curve Diffie-Hellman (ECDH). Answer: a. perfect forward
secrecy
◍ What is data called that is to be encrypted by inputting it into a
cryptographic algorithm?
a. Plaintext
b. Byte-text
c. Ciphertext