Preview (20 questions)
1 Question
vor 30 Sekunden
Q.

A mechanism is used to encrypt and decrypt data.


Cryptography

Algorithm

Data flow

2 Question
vor 30 Sekunden
Q.

A ______ is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext.


Text

Key

Code

3 Question
vor 30 Sekunden
Q.

This is not a type of symmetric-key cryptography technique.


Caesar cipher

Data Encryption Standard

Diffie Hellman cipher

4 Question
vor 30 Sekunden
Q.

A method to implement encryption and decryption of messages traveling in a network is called ______.


Cipher

Logical

Crypto

5 Question
vor 30 Sekunden
Q.

The private key is kept by _______ in asymmetric key cryptography.


Sender

Receiver

6 Question
vor 30 Sekunden
Q.

The plaintext is used to encrypt different cipher text with the same keys.


True

False

7 Question
vor 30 Sekunden
Q.

Which of the following key encryption is also known as Conventional cryptography?


Logical

Symmetric

Asymmetric

8 Question
vor 30 Sekunden
Q.

The Data Encryption Standard is an example of a ______ cryptosystem.


Conventional

Asymmetric

Caesar's

9 Question
vor 30 Sekunden
Q.

A process of studying cryptographic system is known as _________.


Cryptocurrency

Cryptanalysis

Cryptometric

10 Question
vor 30 Sekunden
Q.

_______ has strong message authentication and key-material generation, which prevents eavesdropping.


ECN

STEP

TLS

11 Question
vor 30 Sekunden
Q.

A key is a value that works with a cryptographic algorithm to produce a specific cipher text.


True

False

12 Question
vor 30 Sekunden
Q.

Which of the following is an Encrypted text?


Plaintext

Ciphertext

Algorithm

13 Question
vor 30 Sekunden
Q.

Expand the term: AES


Advanced Encryption Standard

Anti-Encryption System

Advanced Encryption Sender

14 Question
vor 30 Sekunden
Q.

The Playfair cipher uses a block of plain text, in which each block contains ____ characters.


One

Two

Three

15 Question
vor 30 Sekunden
Q.

A Public key size and conventional cryptography’s secret key size are unrelated to one another.


True

False

16 Question
vor 30 Sekunden
Q.

An encryption algorithm transforms plain text into:


Cipher text

Simple Text

Empty Text

17 Question
vor 30 Sekunden
Q.

The two methods of encrypting data are ________ and _______.


Substitution, transposition

Block, stream

Symmetric, asymmetric

18 Question
vor 30 Sekunden
Q.

The hardware-based cryptography depends on the operating system.


True

False

19 Question
vor 30 Sekunden
Q.

Block ciphers accumulate symbols in a message of a ______ size.


Fixed

Variable

Integration

20 Question
vor 30 Sekunden
Q.

_______ is a message that can be readable by the sender.


Edited

Main Text

Plain text