OA EXAM ) | NEWEST ACTUAL
EXAM COMPREHENSIVE
QUESTIONS AND CORRECT
VERIFIED ANSWERS | 2025 EDITION
| A+ GRADED | SUCCESS
What type of encryption uses different keys to encrypt
and decrypt the message?
A Symmetric
B Private key
C Secure
D Asymmetric - <<answer>>..D
The most widely used asymmetric encryption algorithm is
what?
A RSA
B Vigenere
C DES
D Caesar Cipher - <<answer>>..A
Original, unencrypted information is referred to as ____.
,A text
B plaintext
C cleantext
D ciphertext - <<answer>>..B
Which of the following is NOT an asymmetric system?
A PGP
B RSA
C SSL
D DES - <<answer>>..D
What is the formula Me%n related to? -
<<answer>>..Encrypting with RSA
Plain-text is equal to the encryption function (E) with the
key (k) and the ciphertext (c) being passed as parameters
to that function - <<answer>>..P= E(k,c) Symmetric
decryption
Not certified for government use - <<answer>>..Class 4
algorithms
64 bit algorithm operating at 56 bits with an 8 bit parity
block - <<answer>>..DES
,AH is the authenticating protocol, and ESP is an
authenticating and encrypting protocol that uses
cryptographic mechanisms to provide source
authentication, confidentiality, and message integrity. -
<<answer>>..Authentication Header (AH) and
Encapsulating Security Payload (ESP).
developed as a Russian national standard and produced
fixed length outputs of 256 bits - <<answer>>..GOST
A measure of the uncertainty associated with a random
variable - <<answer>>..Entropy
Attempts to make the statistical frequencies of the
ciphertext and actual key as complex as possible -
<<answer>>..Confusion
Like AES, Serpent has a block size of 128 bits and can
have a key size of 128, 192, or 256 bits. The algorithm is
also a substitution-permutation network like AES. It uses
32 rounds working with a block of four 32-bit words.
Each round applies one of eight 4-bit to 4-bit S-boxes 32
times in parallel. Designed by Ross Anderson, Eli Biham,
and Lars Knudsen. - <<answer>>..Serpent
What is the difference between Secure HTTP (SHTTP)
and HTTP Secure (HTTPS)? - <<answer>>..S-HTTP is a
technology that protects each message sent between two
, computers, while HTTPS protects the communication
channel between two computers, messages and all.
Which of the following was a multi alphabet cipher
widely used from the 16th century to the early 20th
century? - <<answer>>..Vigenere
A _____ is a function that takes a variable-size input m
and returns a fixed-size string. - <<answer>>..Hash
A small change that yields large effects in the output. -
<<answer>>..Avalanche
Private organizations or governmental security -
<<answer>>..Class 5 Certificates
Numbers that have no factors in common with another. -
<<answer>>..Co-prime numbers
Cryptanalysis attack that exploits vulnerabilities within
the intrinsic algebraic structure of mathematical functions.
- <<answer>>..Algebraic attack
Designed by Ross Anderson and Eli Biham in 1995. The
size of a ________ hash value is 192 bits. -
<<answer>>..TIGER