Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4,6 TrustPilot
logo-home
Examen

DRO2 Cryptography Chapter 1 Exam Prep – PRNG, Ciphers, Probability & Encoding|Questions Verified Provided with Complete A+ Graded Rationales Lates Updated 2026

Note
-
Vendu
-
Pages
5
Grade
A+
Publié le
01-02-2026
Écrit en
2025/2026

DRO2 Cryptography Chapter 1 Exam Prep – PRNG, Ciphers, Probability & Encoding|Questions Verified Provided with Complete A+ Graded Rationales Lates Updated 2026 Which type of random number generator would be the best choice if you were looking for fast speed? Pseudo-random number generator (PRNG) Which cipher makes use of a grid which maps letters into numeric values as part of the encryption process? BIFID Which computing architecture type stores the most significant byte in the lowest memory address? Big Endian In terms of probability, the events that make up the possible outcome of a coin toss would be considered what? mutuality exclusive Which simple cipher method attempts to bolster complexity by adding additional alphabets to be used for the substitution rounds and can change its mapping depending on a variable keyword? polyalphabet The aim of the ______ cipher is to scramble plaintext letters by writing a message in sequence across a number of rails. Rail Fence Within ASCII encoding, characters are mapped to what type of values? Select all that apply. Hex Binary Decimal _____ is the largest positive integer that divides into two numbers without a remainder. GCD If I roll a single standard die, what is the probability that I roll a "3"? 0.167 If you are sending an encrypted message to a colleague using secret-key (symmetric) cryptography, of the choices below, (1) which key would you use to encrypt the message, and (2) which key would your colleague use to decrypt the message? (1) your secret key, (2) your secret key Which simple cipher method entails creation of a single mapping from a given alphabet to a cipher alphabet? mono-alphabetic The Pigpen cipher uses a polyalphabet substitution method. False In _________ encryption, two electronic keys are used, one is used to encrypt the plaintext, and the other is used to decrypt it back to plaintext. asymmetric-key Which type of random number generator would be the best choice if you were interested in avoiding repeating to reduce chances of a value being guessed? True random number generator (TRNG) When setting up the table for use with the Playfair cipher, you should ensure no letters are repeated and also be sure to omit which letter from the matrix? J A ______ is a value which only has factors of 1 and itself, and used in areas such as key exchange and in public key encryption. Prime number What describes a cipher code mapping used only once and then discarded essentially making it uncrackable? One-time pad ________ published the first successful attack against the Vigenère cipher in 1863. Kasiski Which cipher from the list below uses graphical characters such as symbols of some sort for mapping vs mapping to alphabetic characters? Pigpen Cipher Which computing architecture type stores the least significant byte in the lowest memory address? Little Endian In _________ encryption, we use a single electronic key to encrypt the plaintext, and the same key is then used to decrypt. secret-key Scrambled alphabet cipher schemes are easy to implement, but also easy to break mainly via observation of what? Letter and word frequency ASCII utilizes 8-bit values and supports up to 65,536 characters. False Of the choices below, select the ones that are prime numbers. Select all that apply. 72 In _________ encryption, we use a single electronic key to encrypt the plaintext, and the same key is then used to decrypt. symmetric What type of code aims to overcome the ease at which letter and symbol probability in ciphertext can be analyzed, by varying the number of codes mapped to each character? Homophonic substitution code From the list below, which is used for performing full disk encryption? FileVault ________ is a polyalphabetic cipher that employs an improved code over the scrambled alphabet approach, where a different mapping, based on a keyword, is used for each character of the cipher. Vigenère cipher A ____ repeats a random number after a given time (periodic). They are fast and are also deterministic, and are useful in producing a repeatable set of random numbers. Pseudo-random number generator (PRNG) Modulo-2 multiplication operations is equivalent to logical ____ operations. AND Given the two sets (Set A and Set B) of objects below, select the true statement from the list below that

Montrer plus Lire moins
Établissement
Cours









Oups ! Impossible de charger votre document. Réessayez ou contactez le support.

École, étude et sujet

Cours

Infos sur le Document

Publié le
1 février 2026
Nombre de pages
5
Écrit en
2025/2026
Type
Examen
Contient
Questions et réponses

Sujets

Aperçu du contenu

DRO2 Cryptography Chapter 1 Exam Prep – PRNG, Ciphers,
Probability & Encoding|Questions Verified Provided with
Complete A+ Graded Rationales Lates Updated 2026
Which type of random number generator would be the best choice if you were looking for fast
speed?

Pseudo-random number generator (PRNG)

Which cipher makes use of a grid which maps letters into numeric values as part of the
encryption process?

BIFID

Which computing architecture type stores the most significant byte in the lowest memory
address?

Big Endian

In terms of probability, the events that make up the possible outcome of a coin toss would be
considered what?

mutuality exclusive

Which simple cipher method attempts to bolster complexity by adding additional alphabets to
be used for the substitution rounds and can change its mapping depending on a variable
keyword?

polyalphabet

The aim of the ______ cipher is to scramble plaintext letters by writing a message in sequence
across a number of rails.

Rail Fence

Within ASCII encoding, characters are mapped to what type of values? Select all that apply.

Hex

Binary

Decimal

_____ is the largest positive integer that divides into two numbers without a remainder.

GCD

, If I roll a single standard die, what is the probability that I roll a "3"?

0.167

If you are sending an encrypted message to a colleague using secret-key (symmetric)
cryptography, of the choices below, (1) which key would you use to encrypt the message, and
(2) which key would your colleague use to decrypt the message?

(1) your secret key, (2) your secret key

Which simple cipher method entails creation of a single mapping from a given alphabet to a
cipher alphabet?

mono-alphabetic

The Pigpen cipher uses a polyalphabet substitution method.

False

In _________ encryption, two electronic keys are used, one is used to encrypt the plaintext, and
the other is used to decrypt it back to plaintext.

asymmetric-key

Which type of random number generator would be the best choice if you were interested in
avoiding repeating to reduce chances of a value being guessed?

True random number generator (TRNG)

When setting up the table for use with the Playfair cipher, you should ensure no letters are
repeated and also be sure to omit which letter from the matrix?

J

A ______ is a value which only has factors of 1 and itself, and used in areas such as key
exchange and in public key encryption.

Prime number

What describes a cipher code mapping used only once and then discarded essentially making it
uncrackable?

One-time pad

________ published the first successful attack against the Vigenère cipher in 1863.

Kasiski
€14,75
Accéder à l'intégralité du document:

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien

Faites connaissance avec le vendeur

Seller avatar
Les scores de réputation sont basés sur le nombre de documents qu'un vendeur a vendus contre paiement ainsi que sur les avis qu'il a reçu pour ces documents. Il y a trois niveaux: Bronze, Argent et Or. Plus la réputation est bonne, plus vous pouvez faire confiance sur la qualité du travail des vendeurs.
LectAziim Teachme2-tutor
S'abonner Vous devez être connecté afin de suivre les étudiants ou les cours
Vendu
21
Membre depuis
2 année
Nombre de followers
13
Documents
4143
Dernière vente
3 mois de cela
Dont stress yourself on study materials .LectAziim got it all

"Unlock your potential with our online writing store! Discover expert guidance, personalized feedback, and tools for every writer's journey. From crafting compelling essays to mastering creative storytelling, our platform offers interactive courses, one-on-one coaching, and resources tailored to your goals. Start writing your success story today with us!"

5,0

1 revues

5
1
4
0
3
0
2
0
1
0

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions