ECES Practice Quiz (2022/2023) Rated A+
a data concealment method for covert communications that makes use of LSB replacement Ans Steganography 12 % 5 Modulus Math Ans 2 Symmetrical encryption is expressed mathematically as Ans C = E(k,p) Tiger Hash Value Ans 192-bit SHA256 Hash Value Ans 128-bit FORK256 Hash Value Ans 256-bit SHA1 Hash Value Ans 160-bit GOST Hash Value Ans 256-bit MD5 Hash Value Ans 128-bit RIPEMD-160 Hash Value Ans 160-bit AES Symmetric Block Cipher key and block size Ans 128-bit blocks: 128, 192 or 256 bit key IDEA Symmetric Block Cipher key and block size Ans 64-bit blocks; 128 bit key DES Symmetric Block Cipher key and block size Ans 64-bit blocks; 56 bit key Blowfish Symmetric Block Cipher key and block size Ans 64-bit blocks; 32-448 bit key Twofish Symmetric Block Cipher key and block size Ans 128-bit blocks; 1-256 bit key Skipjack Symmetric Block Cipher key and block size Ans 64-bit blocks; 80 bit key Serpent Symmetric Block Cipher key and block size Ans 128 bit blocks; 128, 192 or 256 bit key Asymmetric encryption algorithms Ans RSA, ECC, DSA Symmetric stream ciphers Ans FISH, PIKE, RC4 Hash algorithms Ans FORK256, MD5, GOST, RIPEMD-160 Viable options for key exchange Ans DH, ECDH, MQV 32-round symmetric block ciphers Ans Skipjack and Serpent Which asymmetric encryption algorithm leverages characteristics of prime numbers and utilizes variable key lengths? Ans RSA Which equation represents the encryption process for RSA? Ans Me % n How many rounds are used in AES encryption? Ans 10, 12 or 14 Of the two processes used in symmetric key cryptography, which involves XORing the plaintext message with the key? Ans Substitution Of the two processes used in symmetric key cryptography, which involves swapping blocks of the text? Ans Transposition An instance where two different pieces of data are hashed separately, but both result in a single identical hash value is described by what term? Ans Collision An instance where different encryption keys generate the same ciphertext from the same plaintext message is described by what term? Ans Clustering Symmetric decryption is expressed mathematically as Ans P = E(k,c) Instances where a change in one bit in the plaintext would affect all the bits of the ciphertext is best described by what term? Ans Avalanche Instances where a change in one bit in the plaintext would affect multiple characters in the ciphertext is best describe by what term? Ans Diffusion What is the standard for digital certificates? Ans X.509 If timeliness is a priority factor for checking revocation status, which option would you prefer? Ans OCSP When looking for an encryption scheme where speed is of utmost importance, which would you prefer? Ans Symmetric When looking for an encryption solution for the data on your computer where full disk encryption is of utmost importance, which would you prefer? Ans Bitlocker What Federal Information Processing Standard pertains to DSA? Ans FIPS 186
Written for
- Institution
- ECES Practice
- Course
- ECES Practice
Document information
- Uploaded on
- July 11, 2023
- Number of pages
- 4
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
eces practice quiz 20222023 rated a