Exam with answers
We have symmetric and asymmetric (public key)
encryption. What can you say about the encryption and
decryption keys of symmetric encryption, Are they the
same? - CORRECT ANSWERS ✔✔same
We have symmetric and asymmetric (public key)
encryption. What can you say about the encryption and
decryption keys of asymmetric encryption, Are they the
same? - CORRECT ANSWERS ✔✔different
In the context of Cryptography the initials C, I, A are
used?
What does C stand for? - CORRECT ANSWERS
✔✔Confidentiality
In the context of Cryptography the initials C, I, A are
used?
What does A stand for? - CORRECT ANSWERS
✔✔Availability
,T/F Security attacks are distinguished as passive or
active. In a passive attack the adversary attempts to
learn information from the system. - CORRECT ANSWERS
✔✔true
T/F Security attacks are distinguished as passive or
active. In an active attack the adversary attempts to
affect (alter) system resources - CORRECT ANSWERS
✔✔true
The physical distance between co-channel cells is
roughly: (answer should be "x cell" or "x cells") -
CORRECT ANSWERS ✔✔2.5 cells
T/F The 5G high frequency bandwidth is in the millimeter-
wave frequency range (24.25 GHz and above). - CORRECT
ANSWERS ✔✔true
Heisenberg's duality principle says that there is a natural
tradeoff between knowing a particle's position and its
momentum (speed): the greater the uncertainty in it's
position, the smaller the uncertainty in its momentum.
Schroedinger found it absurd the possibility that particles
can have simultaneously different states and proposed a
thought experiment (paradox) in which "objects" could
have two different states at the same time (each with a
certain probability).
,What "object" did this experiment involve? (answer is one
word) - CORRECT ANSWERS ✔✔cat
In the Quantum Crypto experiment based on
Schroedinger's paradox Alice sends Bob four steel boxes.
Bob observes that none of the boxes have been opened
( tampered). Bob then opens the boxes and finds that all
the cats are alive with the first three being black and the
last white. What is the exchanged 4-bit string? - CORRECT
ANSWERS ✔✔1110
Following is an applications where authentication is
needed: list the item needed to implement it?Access to a
terminal (one word): -------------- - CORRECT ANSWERS
✔✔password
Following is an applications where authentication is
needed: list the items needed to implement it?Access to a
(recent) iPhone: ---------- , ------------ - CORRECT ANSWERS
✔✔password, facial recognition
Key, facial recognition
password, face
key, face
Following is an application where authentication is
needed: withdraw money from an ATM. List what is
, needed. - CORRECT ANSWERS ✔✔card, pin (personal
identification number)
How many keys are used in symmetric encryption? -
CORRECT ANSWERS ✔✔one
How many keys are used in asymmetric (public key)
encryption? - CORRECT ANSWERS ✔✔two
Two techniques are used for symmetric key encryption:
substitution and transposition.
a. Substitution is used to establish confusion.
b. Substitution is used to establish diffusion. - CORRECT
ANSWERS ✔✔a
Two techniques are used for symmetric key encryption:
substitution and transposition.
a. Transposition is used to establish diffusion.
b. Transposition is used to establish confusion. - CORRECT
ANSWERS ✔✔a
An example of a steganography technique is to take the
sequence of first letters of each word of a message. -
CORRECT ANSWERS ✔✔true