Answers 2024
1. What is the primary purpose of encryption in data security?
To compress data for faster transmission
To convert plaintext into ciphertext to protect information
To create backups of data for recovery
To ensure data is easily readable by all users
Answer: To convert plaintext into ciphertext to protect information
2. Which command in Aescrypt is used to decrypt a file that has been previously
encrypted?
-e
-d
-c
-x
Answer: -d
3. Which of the following best describes the primary function of BitLocker in Windows
operating systems?
To encrypt individual files and folders
To provide a secure method for password storage
To encrypt full disks and protect data at rest
To manage user access permissions
Answer: To encrypt full disks and protect data at rest
4. Which of the following best describes the primary function of FileVault in macOS?
To provide network security for macOS devices
To encrypt the entire disk to protect user data
To manage user authentication and access control
To facilitate secure file sharing between users
Answer: To encrypt the entire disk to protect user data
5. Which of the following best describes a mono-alphabetic substitution cipher?
A method that uses multiple keys for encryption and decryption
A cipher that replaces each letter in the plaintext with a corresponding letter from a fixed cipher
alphabet
A technique that combines plaintext with a random key to produce ciphertext
A system that encrypts data by rearranging the letters of the plaintext
Answer: A cipher that replaces each letter in the plaintext with a corresponding letter from a
fixed cipher alphabet
, 6. What is the primary characteristic of a polyalphabetic cipher compared to a
monoalphabetic cipher?
It uses a single substitution alphabet for encryption
It employs multiple substitution alphabets for encryption
It relies solely on transposition techniques
It does not require a key for decryption
Answer: It employs multiple substitution alphabets for encryption
7. Which of the following statements accurately describes the one-time pad encryption
method?
It uses a fixed key that can be reused multiple times
It requires the key to be as long as the message and used only once
It is a symmetric encryption method that relies on a shared secret
It is a type of hashing algorithm that produces a fixed-size output
Answer: It requires the key to be as long as the message and used only once
8. Which of the following statements accurately describes the characteristics of Pseudo-
Random Number Generators (PRNGs)?
PRNGs generate truly random numbers that cannot be predicted
PRNGs are inherently slow and not suitable for cryptographic applications
PRNGs produce a sequence of numbers that can be reproduced if the initial seed is known
PRNGs rely on external entropy sources to ensure randomness
Answer: PRNGs produce a sequence of numbers that can be reproduced if the initial seed is
known
9. Which of the following statements best describes the characteristics of True Random
Number Generators (TRNGs)?
They produce random numbers quickly and deterministically based on algorithms
They generate random numbers using physical processes, making them inherently unpredictable
They rely on pseudo-random algorithms to simulate randomness
They are primarily used for generating encryption keys in symmetric encryption
Answer: They generate random numbers using physical processes, making them inherently
unpredictable
10. What is the primary technique used in frequency analysis to decipher a substitution
cipher?
Identifying the most commonly occurring symbols in the ciphertext
Applying a brute force attack to test all possible keys
Utilizing a known plaintext attack to find matching segments
Employing a random sampling method to guess the key
Answer: Identifying the most commonly occurring symbols in the ciphertext