ECES-PRACTICE TEST QUESTIONS & ANSWERS
Asymmetric - Answer -What type of encryption uses different keys to encrypt and
decrypt the message?
RSA - Answer -The most widely used asymmetric encryption algorithim is what?
Plaintext - Answer -Original, unencrypted information is referred to as ____.
DES - Answer -Which of the following is not an asymmetric system?
User B's public key - Answer -In order for User A to send User B an encrypted
message that only User B can read, User A must encrypt message with which of the
following keys?
The problem of key exchange - Answer -The greatest weakness with symmetric
algorithms is ____.
Larger block sizes increase security - Answer -Which of the following is generally true
about block sizes?
Hash - Answer -A ____ is a function that takes a variable-size input m and returns a
fixed-size string.
Diffie-Hellman - Answer -Which of the following is cryptographic protocol that allows
two parties to establish a shared key over an insecure channel?
Digital Signature - Answer -A ____ is a digital representation of information that
identifies you as a relevant entity by a trusted third party?
X.509 - Answer -What is the standard used by most digital certificates?
56 bits - Answer -DES uses keys of what size?
512 bits - Answer -Which of the following is not a key size used by AES?
Vigenere - Answer -Which of the following was a multi alphabet cipher widely used
from the 16th century (1553) to the early 20th century (1900s)?
Atbash - Answer -Which of the following is a substitution cipher used by ancient
Hebrew scholars?
Single substitution - Answer -Shifting each letter in the alphabet a fixed number of
spaces to the right or left is an example of what?
Asymmetric - Answer -What type of encryption uses different keys to encrypt and
decrypt the message?
RSA - Answer -The most widely used asymmetric encryption algorithim is what?
Plaintext - Answer -Original, unencrypted information is referred to as ____.
DES - Answer -Which of the following is not an asymmetric system?
User B's public key - Answer -In order for User A to send User B an encrypted
message that only User B can read, User A must encrypt message with which of the
following keys?
The problem of key exchange - Answer -The greatest weakness with symmetric
algorithms is ____.
Larger block sizes increase security - Answer -Which of the following is generally true
about block sizes?
Hash - Answer -A ____ is a function that takes a variable-size input m and returns a
fixed-size string.
Diffie-Hellman - Answer -Which of the following is cryptographic protocol that allows
two parties to establish a shared key over an insecure channel?
Digital Signature - Answer -A ____ is a digital representation of information that
identifies you as a relevant entity by a trusted third party?
X.509 - Answer -What is the standard used by most digital certificates?
56 bits - Answer -DES uses keys of what size?
512 bits - Answer -Which of the following is not a key size used by AES?
Vigenere - Answer -Which of the following was a multi alphabet cipher widely used
from the 16th century (1553) to the early 20th century (1900s)?
Atbash - Answer -Which of the following is a substitution cipher used by ancient
Hebrew scholars?
Single substitution - Answer -Shifting each letter in the alphabet a fixed number of
spaces to the right or left is an example of what?