Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

ECES Practice Quiz (2022/2023) Rated A+

Rating
-
Sold
-
Pages
4
Grade
A+
Uploaded on
11-07-2023
Written in
2022/2023

a data concealment method for covert communications that makes use of LSB replacement Ans Steganography 12 % 5 Modulus Math Ans 2 Symmetrical encryption is expressed mathematically as Ans C = E(k,p) Tiger Hash Value Ans 192-bit SHA256 Hash Value Ans 128-bit FORK256 Hash Value Ans 256-bit SHA1 Hash Value Ans 160-bit GOST Hash Value Ans 256-bit MD5 Hash Value Ans 128-bit RIPEMD-160 Hash Value Ans 160-bit AES Symmetric Block Cipher key and block size Ans 128-bit blocks: 128, 192 or 256 bit key IDEA Symmetric Block Cipher key and block size Ans 64-bit blocks; 128 bit key DES Symmetric Block Cipher key and block size Ans 64-bit blocks; 56 bit key Blowfish Symmetric Block Cipher key and block size Ans 64-bit blocks; 32-448 bit key Twofish Symmetric Block Cipher key and block size Ans 128-bit blocks; 1-256 bit key Skipjack Symmetric Block Cipher key and block size Ans 64-bit blocks; 80 bit key Serpent Symmetric Block Cipher key and block size Ans 128 bit blocks; 128, 192 or 256 bit key Asymmetric encryption algorithms Ans RSA, ECC, DSA Symmetric stream ciphers Ans FISH, PIKE, RC4 Hash algorithms Ans FORK256, MD5, GOST, RIPEMD-160 Viable options for key exchange Ans DH, ECDH, MQV 32-round symmetric block ciphers Ans Skipjack and Serpent Which asymmetric encryption algorithm leverages characteristics of prime numbers and utilizes variable key lengths? Ans RSA Which equation represents the encryption process for RSA? Ans Me % n How many rounds are used in AES encryption? Ans 10, 12 or 14 Of the two processes used in symmetric key cryptography, which involves XORing the plaintext message with the key? Ans Substitution Of the two processes used in symmetric key cryptography, which involves swapping blocks of the text? Ans Transposition An instance where two different pieces of data are hashed separately, but both result in a single identical hash value is described by what term? Ans Collision An instance where different encryption keys generate the same ciphertext from the same plaintext message is described by what term? Ans Clustering Symmetric decryption is expressed mathematically as Ans P = E(k,c) Instances where a change in one bit in the plaintext would affect all the bits of the ciphertext is best described by what term? Ans Avalanche Instances where a change in one bit in the plaintext would affect multiple characters in the ciphertext is best describe by what term? Ans Diffusion What is the standard for digital certificates? Ans X.509 If timeliness is a priority factor for checking revocation status, which option would you prefer? Ans OCSP When looking for an encryption scheme where speed is of utmost importance, which would you prefer? Ans Symmetric When looking for an encryption solution for the data on your computer where full disk encryption is of utmost importance, which would you prefer? Ans Bitlocker What Federal Information Processing Standard pertains to DSA? Ans FIPS 186

Show more Read less
Institution
ECES Practice
Course
ECES Practice








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ECES Practice
Course
ECES Practice

Document information

Uploaded on
July 11, 2023
Number of pages
4
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$10.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
Mawseron
4.0
(1)

Get to know the seller

Seller avatar
Mawseron University of the People
View profile
Follow You need to be logged in order to follow users or courses
Sold
6
Member since
2 year
Number of followers
3
Documents
198
Last sold
1 year ago

latest updated documents, correct, verified & graded A study materials

4.0

1 reviews

5
0
4
1
3
0
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions