Probability & Encoding|Questions Verified Provided with
Complete A+ Graded Rationales Lates Updated 2026
Which type of random number generator would be the best choice if you were looking for fast
speed?
Pseudo-random number generator (PRNG)
Which cipher makes use of a grid which maps letters into numeric values as part of the
encryption process?
BIFID
Which computing architecture type stores the most significant byte in the lowest memory
address?
Big Endian
In terms of probability, the events that make up the possible outcome of a coin toss would be
considered what?
mutuality exclusive
Which simple cipher method attempts to bolster complexity by adding additional alphabets to
be used for the substitution rounds and can change its mapping depending on a variable
keyword?
polyalphabet
The aim of the ______ cipher is to scramble plaintext letters by writing a message in sequence
across a number of rails.
Rail Fence
Within ASCII encoding, characters are mapped to what type of values? Select all that apply.
Hex
Binary
Decimal
_____ is the largest positive integer that divides into two numbers without a remainder.
GCD
, If I roll a single standard die, what is the probability that I roll a "3"?
0.167
If you are sending an encrypted message to a colleague using secret-key (symmetric)
cryptography, of the choices below, (1) which key would you use to encrypt the message, and
(2) which key would your colleague use to decrypt the message?
(1) your secret key, (2) your secret key
Which simple cipher method entails creation of a single mapping from a given alphabet to a
cipher alphabet?
mono-alphabetic
The Pigpen cipher uses a polyalphabet substitution method.
False
In _________ encryption, two electronic keys are used, one is used to encrypt the plaintext, and
the other is used to decrypt it back to plaintext.
asymmetric-key
Which type of random number generator would be the best choice if you were interested in
avoiding repeating to reduce chances of a value being guessed?
True random number generator (TRNG)
When setting up the table for use with the Playfair cipher, you should ensure no letters are
repeated and also be sure to omit which letter from the matrix?
J
A ______ is a value which only has factors of 1 and itself, and used in areas such as key
exchange and in public key encryption.
Prime number
What describes a cipher code mapping used only once and then discarded essentially making it
uncrackable?
One-time pad
________ published the first successful attack against the Vigenère cipher in 1863.
Kasiski