CMIT 382 FINAL EXAM 2026 LATEST REAL
EXAM EXAM STUDY GUIDE COMPLETE Q
AND A FULL SOLUTION
⩥ Which of the ff. is a form of mathematical attack against the
complexity of a cryptosystem's algorithm? Answer: Analytic Attack
⩥ What is the cryptography mechanism which hides secret
communications within various forms of data? Answer: Steganography
⩥ Which of the ff. encryption methods combines a random value with
the plain text to produce the cipher text? Answer: One-time pad
⩥ The Enigma machine, a cryptographic tool introduced in 1944 and
used in WW2, encrypted messages by replacing characters for plain text.
Which type of cipher does the Enigma machine use? Answer:
Substitution
⩥ Which of the ff. attacks will typically take the longest amount of time
to complete? Answer: Brute force attack
⩥ In which type of attack does the attacker have access to both the plain
text and the resulting cipher text, but does not have the ability to encrypt
the plain text? Answer: Known plaintext
, ⩥ When an attacker decrypts an encoded message using a different key
than was used during encryption, what type of attack has occurred?
Answer: Key clustering
⩥ In a cryptographic system, what properties should the initialization
vector have? (Select two.) Answer: Unpredictable, Large
⩥ Which type of cipher changes the position of the characters in a plain
text message? Answer: Transposition
⩥ Your company produces an encryption device that lets you enter text
and receive encrypted text in response. An attacker obtains one of these
devices and starts inputting random plain text to see the resulting cipher
text. What type of attack is this? Answer: Chosen plaintext
⩥ Which of the ff. password attacks adds appendages to known
dictionary words? Answer: Hybrid
⩥ Which form of cryptanalysis focuses on the weaknesses in the
supporting computing platform as a means to exploit and defeat
encryption? Answer: Statistical attack
⩥ Why are brute force attacks always successful? Answer: They test
every possible valid combination
EXAM EXAM STUDY GUIDE COMPLETE Q
AND A FULL SOLUTION
⩥ Which of the ff. is a form of mathematical attack against the
complexity of a cryptosystem's algorithm? Answer: Analytic Attack
⩥ What is the cryptography mechanism which hides secret
communications within various forms of data? Answer: Steganography
⩥ Which of the ff. encryption methods combines a random value with
the plain text to produce the cipher text? Answer: One-time pad
⩥ The Enigma machine, a cryptographic tool introduced in 1944 and
used in WW2, encrypted messages by replacing characters for plain text.
Which type of cipher does the Enigma machine use? Answer:
Substitution
⩥ Which of the ff. attacks will typically take the longest amount of time
to complete? Answer: Brute force attack
⩥ In which type of attack does the attacker have access to both the plain
text and the resulting cipher text, but does not have the ability to encrypt
the plain text? Answer: Known plaintext
, ⩥ When an attacker decrypts an encoded message using a different key
than was used during encryption, what type of attack has occurred?
Answer: Key clustering
⩥ In a cryptographic system, what properties should the initialization
vector have? (Select two.) Answer: Unpredictable, Large
⩥ Which type of cipher changes the position of the characters in a plain
text message? Answer: Transposition
⩥ Your company produces an encryption device that lets you enter text
and receive encrypted text in response. An attacker obtains one of these
devices and starts inputting random plain text to see the resulting cipher
text. What type of attack is this? Answer: Chosen plaintext
⩥ Which of the ff. password attacks adds appendages to known
dictionary words? Answer: Hybrid
⩥ Which form of cryptanalysis focuses on the weaknesses in the
supporting computing platform as a means to exploit and defeat
encryption? Answer: Statistical attack
⩥ Why are brute force attacks always successful? Answer: They test
every possible valid combination