MSIS 4123 QUIZ 2 COMPREHENSIVE
REVIEW 2026 FULL QUESTIONS AND
VERIFIED ANSWERS
◉ What is/are the input(s) for a decryption procedure? Select all that
apply. Answer: Ciphertext
A key
◉ An encryption algorithm that uses the same key for both encryption
and decryption is: Answer: symmetric.
◉ Encryption protects information by presenting which of the
following? Answer: Key
◉ An algorithm is a type of: Answer: procedure
◉ The type of cipher that rearranges the text of a message is called:
Answer: transposition.
◉ True or False? Microsoft's built in encryption protects the user's file
against a CryptoLocker ransomware. Answer: False
◉ True or False? The Advanced Encryption Standard (AES) is stronger
than the Data Encryption Standard (DES). Answer: True
, ◉ The steps below describe how to use an encryption program. Arrange
the steps in their proper order. Answer: Step 1.
Select the file to encrypt.
Step 2.
Provide the key to encrypt the file.
Step 3.
The program encrypts the file and saves the encrypted copy.
Step 4.
The program erases the plaintext version of the file and erases the key
from RAM.
◉ Encryption transfers readable ____________ into unreadable
_____________ using secret information called a _______. Answer:
plaintext; ciphertext; key
◉ True or False? Microsoft Windows 10 Professional edition includes
an encryption system called BitLocker. Answer: True
◉ _________________is a cipher that changes the order in which the
messages symbols appear. Answer: Transposition cipher
◉ _________________is a cipher that changes the symbols in the
message, while retaining their order in the message. Answer:
Substitution cipher
REVIEW 2026 FULL QUESTIONS AND
VERIFIED ANSWERS
◉ What is/are the input(s) for a decryption procedure? Select all that
apply. Answer: Ciphertext
A key
◉ An encryption algorithm that uses the same key for both encryption
and decryption is: Answer: symmetric.
◉ Encryption protects information by presenting which of the
following? Answer: Key
◉ An algorithm is a type of: Answer: procedure
◉ The type of cipher that rearranges the text of a message is called:
Answer: transposition.
◉ True or False? Microsoft's built in encryption protects the user's file
against a CryptoLocker ransomware. Answer: False
◉ True or False? The Advanced Encryption Standard (AES) is stronger
than the Data Encryption Standard (DES). Answer: True
, ◉ The steps below describe how to use an encryption program. Arrange
the steps in their proper order. Answer: Step 1.
Select the file to encrypt.
Step 2.
Provide the key to encrypt the file.
Step 3.
The program encrypts the file and saves the encrypted copy.
Step 4.
The program erases the plaintext version of the file and erases the key
from RAM.
◉ Encryption transfers readable ____________ into unreadable
_____________ using secret information called a _______. Answer:
plaintext; ciphertext; key
◉ True or False? Microsoft Windows 10 Professional edition includes
an encryption system called BitLocker. Answer: True
◉ _________________is a cipher that changes the order in which the
messages symbols appear. Answer: Transposition cipher
◉ _________________is a cipher that changes the symbols in the
message, while retaining their order in the message. Answer:
Substitution cipher