With Objective Solutions
How did the ATBASH cipher work?
a. By shifting each letter a certain number of spaces
b. By Multi alphabet substitution
c. By rotating text a given number of spaces
d. By substituting each letter for the letter from the opposite end of the
alphabet (i.e. A becomes Z, B becomes Y, etc.) Correct Answer - D. By
substituting each letter for the letter from the opposite end of the alphabet
(i.e. A becomes Z, B becomes Y, etc.)
DES has a key space of what?
a. 2^128
b. 2^192
c. 2^56
d. 2^64 Correct Answer - c. 2^56
Which of the following are valid key sizes for AES (choose three)?
a. 56
b. 64
c. 128
d. 192
e. 256
f. 512 Correct Answer - c. 128
d. 192
e. 256
Which of the following algorithms uses three different keys to encrypt the
plain text?
a. AES
b. 3DES
c. Blowfish
d. Skipjack Correct Answer - b. 3DES
Which of the following is a block cipher?
a. AES
b. RC4
, c. DH
d. RSA Correct Answer - a. AES
Which of the following is a type of encryption that has two different keys. One
key can encrypt the message and the other key can only decrypt it?
a. Symmetric
b. Asymmetric
c. Block cipher
d. Stream cipher Correct Answer - b. Asymmetric
Which of the following is an asymmetric cipher?
a. DES
b. RC4
c. RSA
d. AES Correct Answer - c. RSA
A cipher is defined as what
a. Any algorithm used in cryptography
b. The key used to encrypt a message
c. The algorithm(s) needed to encrypt and decrypt a message
d. Encrypted text Correct Answer - c. The algorithm(s) needed to
encrypt and decrypt a message
Which of the following is not an asymmetric system?
a. DH
b. AES
c. RSA
d. PGP Correct Answer - b. AES
John is going to use RSA to encrypt a message to Joan. What key should he
use?
a. Joan's public key
b. A shared key
c. Joan's private key
d. A random key Correct Answer - a. Joan's public key
What advantage do symmetric algorithms have over asymmetric algorithms
a. They are faster
b. They are more secure