9 30169.201930
College of Technolo g
y
H
Review Test Submission: Week 4 Midterm Exam
User Ilhan Gocmez
Course Summer 2019 - Cryptography (SEC-310-0) Week
Test 4 Midterm Exam
Started 7/31/19 6:03 PM
Submitted 7/31/19 8:42 PM
Status Completed
Attempt 102 out of 100 points
Score
Time 2 hours, 39 minutes
Elapsed
Instructions Please complete the Midterm Exam. The midterm exam covers the content covered in Weeks 1-4. The Mid-term Exam is open book and consists of short answer and
multiple choice questions. Use the textbook and resources found on this Blackboard course.
ResultsAll Answers, Submitted Answers, Correct Answers Displayed
Question 1
2 out of 2 points
DES exhibits the classic block cipher structure, which consists of a number of identical rounds of processing.
Selected
Feiste
Answer:
l
Answers:
Feiste
l
SAC
Shanno
n
Rendell
Question 2
2 out of 2 points
The was used as the standard field system by the British Army in World War I and was used by the U.S. Army and other Allied forces
during World War II.
Selected
Playfair
Answer:
cipher Caesar
Answers:
cipher
Playfair cipher
Hill cipher
Rail Fence cipher
Question 3 2 out of 2 points
techniques map plaintext elements (characters, bits) into ciphertext elements
Selected
Substituti
Answer:
on
Answers:
Transposition
Traditional
Substituti
on Symmetric
Question 4
2 out of 2 points
https://wilmu.blackboard.com/webapps/assessment/review/review.jsp?
attempt_id=_14490244_1&course_id=_468552_1&content_id=_14043534_1&… 1/10
,8/23/201 Review Test Submission: Week 4 Midterm Exam –
9 30169.201930
The appeal of is that its designers have been able to prove an exact relationship between the strength of the embedded hash
function and the strength of this form of authentication.
Selected
HMAC
Answer:
MAC
Answers:
HMAC
GMAC
CMAC
https://wilmu.blackboard.com/webapps/assessment/review/review.jsp?
attempt_id=_14490244_1&course_id=_468552_1&content_id=_14043534_1&… 2/10
, 8/23/201 Review Test Submission: Week 4 Midterm Exam –
9 30169.201930
Question 5
2 out of 2 points
S/MIME provides authentication through the use of .
Selected
digital signatures
Answer:
asymmetric block
Answers:
encryption symmetric
block encryption radix-
64
digital signatures
Question 6
2 out of 2 points
Public-key algorithms are based on .
Selected
mathematical
Answer:
functions permutation
Answers:
mathematical functions
substituti
on
symmetry
Question 7
2 out of 2 points
is the most common method used to conceal small blocks of data, such as encryption keys and hash function values, which are used in digital signatures.
Selected
Asymmetric encryption
Answer:
Symmetric
Answers: encryption Data
integrity algorithms
Asymmetric
encryption
Authentication
protocols
Question 8
2 out of 2 points
The essential elements of any pseudorandom number generator are a and a deterministic algorithm for generating a stream of pseudorandom bits.
Selected
seed
Answer:
value secret
Answers:
key session
key
seed value
stream encryption function
Question 9 2 out of 2 points
The indicates that the subscriber identified in the certificate has sole control and access to the private key
Selected Answer: Answers:
https://wilmu.blackboard.com/webapps/assessment/review/review.jsp?
attempt_id=_14490244_1&course_id=_468552_1&content_id=_14043534_1&… 3/10