ITN 262 MIDTERM EXAM PRACTICE
QUESTIONS WITH CORRECT
ANSWERS
An encryption algorithm that uses the same key for both encryption and decryption is -
Answer-symmetric
AES was introduced in what year? - Answer-2002
The Enigma was - Answer-a rotor machine
The type of cipher that rearranges the text of a message is called - Answer-
transposition
Moore's Law observed that computing power for doubled every - Answer-18 Months
The process of decrypting a code is - Answer-Cryptanalysis
File encryption on the computer's hard drive involves what risk?
A. Access by a separately booted OS
B. Acess to low-level data written to the hard drive
C. Access by a Trojan Horse
D. All of the Answers - Answer-All of the Answers
Hiding an object, such as a diary, to prevent others from finding it is an example of -
Answer-Security through Obscurity
To use symmetric cryptography, the sender and receiver must share - Answer-a secret
key
PGP implemented a _______________ making it so that no single person was
universally trusted to sign certificates. - Answer-Web of trust
In a Diffie-Hellman calculation using P = gs mod N, s, is: - Answer-the private key value
Digital signatures are often used to provide: - Answer-non-repudiation
Using the Diffie-Hellman algorithm: - Answer-both participants in the exchange must
have a public/private key pair
QUESTIONS WITH CORRECT
ANSWERS
An encryption algorithm that uses the same key for both encryption and decryption is -
Answer-symmetric
AES was introduced in what year? - Answer-2002
The Enigma was - Answer-a rotor machine
The type of cipher that rearranges the text of a message is called - Answer-
transposition
Moore's Law observed that computing power for doubled every - Answer-18 Months
The process of decrypting a code is - Answer-Cryptanalysis
File encryption on the computer's hard drive involves what risk?
A. Access by a separately booted OS
B. Acess to low-level data written to the hard drive
C. Access by a Trojan Horse
D. All of the Answers - Answer-All of the Answers
Hiding an object, such as a diary, to prevent others from finding it is an example of -
Answer-Security through Obscurity
To use symmetric cryptography, the sender and receiver must share - Answer-a secret
key
PGP implemented a _______________ making it so that no single person was
universally trusted to sign certificates. - Answer-Web of trust
In a Diffie-Hellman calculation using P = gs mod N, s, is: - Answer-the private key value
Digital signatures are often used to provide: - Answer-non-repudiation
Using the Diffie-Hellman algorithm: - Answer-both participants in the exchange must
have a public/private key pair