ACTUAL EXAM 2025/2026 QUESTIONS WITH
VERIFIED CORRECT SOLUTIONS || 100%
GUARANTEED PASS
<BRAND NEW VERSION>
1. Electronic Code Book (ECB) - ANSWER ✓ Block 1 encrypted = Cipher 1,
Block 2 encrypted = Cipher 2
2. Cipher Block Chaining (CBC) - ANSWER ✓ IV XOR Block 1 = Cipher text
1, Cipher Text 1 XOR Block 2 = Cipher text 2.
3. Cipher Feedback (CFB) - ANSWER ✓ IV encrypted XOR Block 1 = Cipher
1, Cipher 1 XOR Block 2 = Cipher 2
4. Output Feedback (OFB) - ANSWER ✓ IV encrypted XOR Block 1 = Cipher
1, Cipher 1 encrypted XOR Block 2 = Cipher 2
5. Counter Mode (CTR) - ANSWER ✓ Nonce encrypted XOR Block 1 =
Cipher 1, Nonce +1 encrypted XOR block 2 = Cipher 2
6. Triple Data Encryption Standard (3DES) - ANSWER ✓ Symmetric Block
Key size: 112
Block size: 64
Rounds: 48
7. Advanced Encryption Standard (AES) - ANSWER ✓ Symmetric Block
Key Size: 128,192,256
Block size: 128
Rounds: 10, 12, 14
,8. International Data Encryption Algorithm (IDEA) - ANSWER ✓ Symmetric
Block
Key Size: 128
Block Size: 64
Rounds: 17+
9. Skipjack - ANSWER ✓ Symmetric Block
Key Size: 80
Block Size: 64
Rounds: 32
10.Encryption - ANSWER ✓ Changing plaintext to ciphertext
-Applied to information at rest and in transit
11.Decryption - ANSWER ✓ Process of changing ciphertext into plaintext
12.Encrypt individual Files - ANSWER ✓ Aescrypt
13.Encrypt Full Disks - ANSWER ✓ Bitlocker (Windows)
Filevault (Mac)
14.Mono-alphabetic code - ANSWER ✓ A single mapping from our alphanet to
a cipher alphabet is created
-Early cryptosystems used this
15.Polyalphabetic - ANSWER ✓ The mapping of our alphabet to a number of
cipher alphabets
-Adds complexity
16.One-time pad - ANSWER ✓ Only uses its cipher code once
-Unbreakable
17.Pseudo-Random Number Generators - ANSWER ✓ (PRNGs)
Repeats the random numbers after a given time (periodic)
-Fast and deterministic
-Useful in producing repeatable set of random numbers
18.True Random Number Generators - ANSWER ✓ (TRNGs)
, Generates a true random number and uses some form of random process
-Movements of a mouse
-Pauses between keystrokes
-Slow, but non-deterministic
19.Frequency Analysis - ANSWER ✓ Cipher cracking methodology that
involves identifying patterns and variations in the probability of codes
-3 letter code seen often at the beginning of sentences? Might be 'The'
20.Entropy - ANSWER ✓ Measures level of unpredictability - uncertainty in
the encryption process
21.Encoding Methods - ANSWER ✓ ASCII (8-bit, up to 256 characters)
UTF-16 (16-bit, up to 65,536 characters)
22.What is more efficient - hardware or software encryption? - ANSWER ✓
Hardware
23.HSM - ANSWER ✓ Hardware Security Module
-a tamper-evident and intrusion-resistant physical device that safeguards and
manages cryptographic keys and provides cryptographic processing
24.TPM - ANSWER ✓ Trusted Platform Module
-A dedicated processor that handles hardware-level encryption; allows the
use of full disk encryption on a hard drive in a manner that minimizes the
impact on system performance
-Contain encryption keys
25.AND - ANSWER ✓ 11110
10100
10100
26.OR - ANSWER ✓ 11110
10100
11110
27.XOR - ANSWER ✓ 1 1 1 1 0
1 0 100
, 01010
28.Pigpen - ANSWER ✓ Mono-alphabetic subsitution cipher that makes use of
mapping plaintext characters to graphical characters rather than to alphabetic
ones
29.Rail Code - ANSWER ✓ Employs a method to scramble text by writing it in
a sequence across a number of rails
30.BIFID - ANSWER ✓ Makes use of a grid and which maps the letters into
numeric values
31.Playfair - ANSWER ✓ 5x5 matrix containing the alphabet less the letter J.
Cipher/decipher process consists of a set of rules outlining use of column
and row combinations
32.Morse Code - ANSWER ✓ Encoding method, not a cipher, that works by
translating characters into a sequence of dots and dashes
33.Caesar - ANSWER ✓ Mono-alphabetic substitution known as a shift cipher
34.Vigenere - ANSWER ✓ Polyalphabetic cipher that involves using a different
mapping, based on a keyword, for each character of the cipher
-Same plaintext character will have different mappings
35.Four-square Cipher - ANSWER ✓ Uses four 5x5 matrices arranges in a
square, are where each matrix contains 25 letters for encoding and decoding
operations
36.Enigma Machine - ANSWER ✓ Polyalphabetic substitution cipher
-Weakness: none of the plain text letters could ne ciphered as itself
37.Secret Key encryption - ANSWER ✓ Symmetric Cryptography
-Makes use of a single secret key for both encryption and decryption
-Challenge: Finding a secure way to share the key
38.Diffie-Hellman - ANSWER ✓ Widely used key exchange algorithm used to
exchange the secret key in symmetric cryptography