QUESTIONS WITH ANSWERS GRADED A+
◍ AES uses a 128-bit key and is used in PGP encryption software.
Answer: False
◍ Symmetric algorithms use two keys that are mathematically
related. Answer: False
◍ Asymmetric algorithms are more scalable than symmetric
algorithms. Answer: True
◍ ECC is an efficient algorithm requiring few hardware resources, so
it's a perfect candidate for wireless devices and cell phones. Answer:
True
◍ Cryptography is the process of converting plaintext, which is
readable text, into unreadable or encrypted text called which if the
following? Answer: ciphertext
◍ Which of the following is the process of converting ciphertext back
into plaintext? Answer: decryption
◍ What type of cryptography is demonstrated by reversing the
alphabet so A becomes Z, B becomes Y, and so on? Answer:
substitution cipher
, ◍ If a security expert decides to study the process of breaking
encryption algorithms, they are performing which of the following?
Answer: cryptanalysis
◍ Which of the following is a mathematical function or program that
works with a key? Answer: encryption algorithm
◍ Which of the following is a range of allowable values that is used
to generate an encryption key? Answer: keyspace
◍ What type of system converts between plaintext and ciphertext?
Answer: cryptosystem
◍ Which of the following refers to verifying the sender or receiver (or
both) is who they claim to be?
Group of answer choices Answer: Authentication
◍ Which function ensures that a sender and receiver cannot deny
sending or receiving a specific message? Answer: Nonrepudiation
◍ Cryptosystems that have a single key that encrypts and decrypts
data are using what type of algorithm? Answer: symmetric
◍ Which type of symmetric algorithm operates on plaintext one bit at
a time? Answer: stream ciphers