100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

MSIS 4123 Quiz 7 Questions with Correct Answers Latest Update 2025/2026

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
25-11-2025
Written in
2025/2026

MSIS 4123 Quiz 7 Questions with Correct Answers Latest Update 2025/2026 After encrypting a plaintext file and saving its ciphertext in a new file, what should the file encryption program do next? Select the safest alternative. - Answers The program writes zeroes over every data block in the plaintext file. What is/are the input(s) for a decryption procedure? Select all that apply. - Answers Ciphertext A key An encryption algorithm that uses the same key for both encryption and decryption is: - Answers symmetric. Encryption protects information by presenting which of the following? - Answers Key An algorithm is a type of: - Answers procedure The type of cipher that rearranges the text of a message is called: - Answers transposition. True or False? Microsoft's built in encryption protects the user's file against a CryptoLocker ransomware. - Answers False True or False? The Advanced Encryption Standard (AES) is stronger than the Data Encryption Standard (DES). - Answers True The steps below describe how to use an encryption program. Arrange the steps in their proper order. - Answers Step 1. Select the file to encrypt. Step 2. Provide the key to encrypt the file. Step 3. The program encrypts the file and saves the encrypted copy. Step 4. The program erases the plaintext version of the file and erases the key from RAM. Encryption transfers readable ____________ into unreadable _____________ using secret information called a _______. - Answers plaintext; ciphertext; key True or False? Microsoft Windows 10 Professional edition includes an encryption system called BitLocker. - Answers True _________________is a cipher that changes the order in which the messages symbols appear. - Answers Transposition cipher _________________is a cipher that changes the symbols in the message, while retaining their order in the message. - Answers Substitution cipher Which of the following are true about a one-time pad? Select all that apply. - Answers Is theoretically impossible to crack Uses a random stream of bits for its key stream

Show more Read less
Institution
MSIS 4123
Course
MSIS 4123









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
MSIS 4123
Course
MSIS 4123

Document information

Uploaded on
November 25, 2025
Number of pages
8
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

MSIS 4123 Quiz 7 Questions with Correct Answers Latest Update 2025/2026

After encrypting a plaintext file and saving its ciphertext in a new file, what should the file
encryption program do next? Select the safest alternative. - Answers The program writes zeroes
over every data block in the plaintext file.

What is/are the input(s) for a decryption procedure? Select all that apply. - Answers Ciphertext

A key

An encryption algorithm that uses the same key for both encryption and decryption is: - Answers
symmetric.

Encryption protects information by presenting which of the following? - Answers Key

An algorithm is a type of: - Answers procedure

The type of cipher that rearranges the text of a message is called: - Answers transposition.

True or False? Microsoft's built in encryption protects the user's file against a CryptoLocker
ransomware. - Answers False

True or False? The Advanced Encryption Standard (AES) is stronger than the Data Encryption
Standard (DES). - Answers True

The steps below describe how to use an encryption program. Arrange the steps in their proper
order. - Answers Step 1.

Select the file to encrypt.

Step 2.

Provide the key to encrypt the file.

Step 3.

The program encrypts the file and saves the encrypted copy.

Step 4.

The program erases the plaintext version of the file and erases the key from RAM.

Encryption transfers readable ____________ into unreadable _____________ using secret
information called a _______. - Answers plaintext; ciphertext; key

True or False? Microsoft Windows 10 Professional edition includes an encryption system called
BitLocker. - Answers True

_________________is a cipher that changes the order in which the messages symbols appear. -

, Answers Transposition cipher

_________________is a cipher that changes the symbols in the message, while retaining their
order in the message. - Answers Substitution cipher

Which of the following are true about a one-time pad? Select all that apply. - Answers Is
theoretically impossible to crack

Uses a random stream of bits for its key stream

The Enigma was used by the _________ in World War II. - Answers Germans

Why do protocols like IKE and SSL exchange nonces as part of their key creation/exchange
protocol? Select all that apply. - Answers no (The nonces provide additional secret randomness
to make the generated keys harder to guess. )

yes (New nonce values should make it impossible for an attacker to replay a previous set of
messages and force the connection to reuse a previous key. )

True or False? The two primary types of symmetric algorithms are public key cipher and private
key cipher. - Answers false

True or False? An encryption application program, from a user's point of view, protects a file
with a memorized password. - Answers True

_____________ is a message before its contents are hidden using a code or cipher. - Answers
Plaintext

A Caesar cipher encrypts texts by shifting letters three places, so that A becomes D. Decode
this phrase: zhoo grqh. - Answers well done

True or False? After encrypting a plaintext file, it should actively erase the plaintext file's content
and save the encryption. - Answers True

_________________is a cipher that uses the same key for both encryption and decryption. -
Answers Symmetric cipher

Which cipher replaces A with D and B with E? - Answers Caesar

In cryptography, key is _________________________________. - Answers the changeable part of the
encryption process that remains secret

Which of the following is a stream cipher algorithm? - Answers RC4 (Rivest's cipher 4)

Which of the following is a block cipher algorithm? - Answers All of the others

Bob and Kevin are both using symmetric crypto to exchange sensitive information with other
people. Although Bob and Kevin sometimes exchange sensitive information using a symmetric

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
337
Member since
1 year
Number of followers
16
Documents
28454
Last sold
1 day ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

53 reviews

5
18
4
14
3
12
2
0
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions