100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

DRO2 Cryptography Chapter 1 Exam Prep – PRNG, Ciphers, Probability & Encoding|Questions Verified Provided with Complete A+ Graded Rationales Lates Updated 2026

Beoordeling
-
Verkocht
-
Pagina's
5
Cijfer
A+
Geüpload op
01-02-2026
Geschreven in
2025/2026

DRO2 Cryptography Chapter 1 Exam Prep – PRNG, Ciphers, Probability & Encoding|Questions Verified Provided with Complete A+ Graded Rationales Lates Updated 2026 Which type of random number generator would be the best choice if you were looking for fast speed? Pseudo-random number generator (PRNG) Which cipher makes use of a grid which maps letters into numeric values as part of the encryption process? BIFID Which computing architecture type stores the most significant byte in the lowest memory address? Big Endian In terms of probability, the events that make up the possible outcome of a coin toss would be considered what? mutuality exclusive Which simple cipher method attempts to bolster complexity by adding additional alphabets to be used for the substitution rounds and can change its mapping depending on a variable keyword? polyalphabet The aim of the ______ cipher is to scramble plaintext letters by writing a message in sequence across a number of rails. Rail Fence Within ASCII encoding, characters are mapped to what type of values? Select all that apply. Hex Binary Decimal _____ is the largest positive integer that divides into two numbers without a remainder. GCD If I roll a single standard die, what is the probability that I roll a "3"? 0.167 If you are sending an encrypted message to a colleague using secret-key (symmetric) cryptography, of the choices below, (1) which key would you use to encrypt the message, and (2) which key would your colleague use to decrypt the message? (1) your secret key, (2) your secret key Which simple cipher method entails creation of a single mapping from a given alphabet to a cipher alphabet? mono-alphabetic The Pigpen cipher uses a polyalphabet substitution method. False In _________ encryption, two electronic keys are used, one is used to encrypt the plaintext, and the other is used to decrypt it back to plaintext. asymmetric-key Which type of random number generator would be the best choice if you were interested in avoiding repeating to reduce chances of a value being guessed? True random number generator (TRNG) When setting up the table for use with the Playfair cipher, you should ensure no letters are repeated and also be sure to omit which letter from the matrix? J A ______ is a value which only has factors of 1 and itself, and used in areas such as key exchange and in public key encryption. Prime number What describes a cipher code mapping used only once and then discarded essentially making it uncrackable? One-time pad ________ published the first successful attack against the Vigenère cipher in 1863. Kasiski Which cipher from the list below uses graphical characters such as symbols of some sort for mapping vs mapping to alphabetic characters? Pigpen Cipher Which computing architecture type stores the least significant byte in the lowest memory address? Little Endian In _________ encryption, we use a single electronic key to encrypt the plaintext, and the same key is then used to decrypt. secret-key Scrambled alphabet cipher schemes are easy to implement, but also easy to break mainly via observation of what? Letter and word frequency ASCII utilizes 8-bit values and supports up to 65,536 characters. False Of the choices below, select the ones that are prime numbers. Select all that apply. 72 In _________ encryption, we use a single electronic key to encrypt the plaintext, and the same key is then used to decrypt. symmetric What type of code aims to overcome the ease at which letter and symbol probability in ciphertext can be analyzed, by varying the number of codes mapped to each character? Homophonic substitution code From the list below, which is used for performing full disk encryption? FileVault ________ is a polyalphabetic cipher that employs an improved code over the scrambled alphabet approach, where a different mapping, based on a keyword, is used for each character of the cipher. Vigenère cipher A ____ repeats a random number after a given time (periodic). They are fast and are also deterministic, and are useful in producing a repeatable set of random numbers. Pseudo-random number generator (PRNG) Modulo-2 multiplication operations is equivalent to logical ____ operations. AND Given the two sets (Set A and Set B) of objects below, select the true statement from the list below that

Meer zien Lees minder
Instelling
Vak









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Vak

Documentinformatie

Geüpload op
1 februari 2026
Aantal pagina's
5
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

DRO2 Cryptography Chapter 1 Exam Prep – PRNG, Ciphers,
Probability & Encoding|Questions Verified Provided with
Complete A+ Graded Rationales Lates Updated 2026
Which type of random number generator would be the best choice if you were looking for fast
speed?

Pseudo-random number generator (PRNG)

Which cipher makes use of a grid which maps letters into numeric values as part of the
encryption process?

BIFID

Which computing architecture type stores the most significant byte in the lowest memory
address?

Big Endian

In terms of probability, the events that make up the possible outcome of a coin toss would be
considered what?

mutuality exclusive

Which simple cipher method attempts to bolster complexity by adding additional alphabets to
be used for the substitution rounds and can change its mapping depending on a variable
keyword?

polyalphabet

The aim of the ______ cipher is to scramble plaintext letters by writing a message in sequence
across a number of rails.

Rail Fence

Within ASCII encoding, characters are mapped to what type of values? Select all that apply.

Hex

Binary

Decimal

_____ is the largest positive integer that divides into two numbers without a remainder.

GCD

, If I roll a single standard die, what is the probability that I roll a "3"?

0.167

If you are sending an encrypted message to a colleague using secret-key (symmetric)
cryptography, of the choices below, (1) which key would you use to encrypt the message, and
(2) which key would your colleague use to decrypt the message?

(1) your secret key, (2) your secret key

Which simple cipher method entails creation of a single mapping from a given alphabet to a
cipher alphabet?

mono-alphabetic

The Pigpen cipher uses a polyalphabet substitution method.

False

In _________ encryption, two electronic keys are used, one is used to encrypt the plaintext, and
the other is used to decrypt it back to plaintext.

asymmetric-key

Which type of random number generator would be the best choice if you were interested in
avoiding repeating to reduce chances of a value being guessed?

True random number generator (TRNG)

When setting up the table for use with the Playfair cipher, you should ensure no letters are
repeated and also be sure to omit which letter from the matrix?

J

A ______ is a value which only has factors of 1 and itself, and used in areas such as key
exchange and in public key encryption.

Prime number

What describes a cipher code mapping used only once and then discarded essentially making it
uncrackable?

One-time pad

________ published the first successful attack against the Vigenère cipher in 1863.

Kasiski

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
LectAziim Teachme2-tutor
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
21
Lid sinds
2 jaar
Aantal volgers
13
Documenten
4143
Laatst verkocht
3 maanden geleden
Dont stress yourself on study materials .LectAziim got it all

"Unlock your potential with our online writing store! Discover expert guidance, personalized feedback, and tools for every writer's journey. From crafting compelling essays to mastering creative storytelling, our platform offers interactive courses, one-on-one coaching, and resources tailored to your goals. Start writing your success story today with us!"

5,0

1 beoordelingen

5
1
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen