Preview (20 questions)
1 Question
il y a 30 secondes
Q.

A mechanism is used to encrypt and decrypt data.


Cryptography

Algorithm

Data flow

2 Question
il y a 30 secondes
Q.

A ______ is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext.


Text

Key

Code

3 Question
il y a 30 secondes
Q.

This is not a type of symmetric-key cryptography technique.


Caesar cipher

Data Encryption Standard

Diffie Hellman cipher

4 Question
il y a 30 secondes
Q.

A method to implement encryption and decryption of messages traveling in a network is called ______.


Cipher

Logical

Crypto

5 Question
il y a 30 secondes
Q.

The private key is kept by _______ in asymmetric key cryptography.


Sender

Receiver

6 Question
il y a 30 secondes
Q.

The plaintext is used to encrypt different cipher text with the same keys.


True

False

7 Question
il y a 30 secondes
Q.

Which of the following key encryption is also known as Conventional cryptography?


Logical

Symmetric

Asymmetric

8 Question
il y a 30 secondes
Q.

The Data Encryption Standard is an example of a ______ cryptosystem.


Conventional

Asymmetric

Caesar's

9 Question
il y a 30 secondes
Q.

A process of studying cryptographic system is known as _________.


Cryptocurrency

Cryptanalysis

Cryptometric

10 Question
il y a 30 secondes
Q.

_______ has strong message authentication and key-material generation, which prevents eavesdropping.


ECN

STEP

TLS

11 Question
il y a 30 secondes
Q.

A key is a value that works with a cryptographic algorithm to produce a specific cipher text.


True

False

12 Question
il y a 30 secondes
Q.

Which of the following is an Encrypted text?


Plaintext

Ciphertext

Algorithm

13 Question
il y a 30 secondes
Q.

Expand the term: AES


Advanced Encryption Standard

Anti-Encryption System

Advanced Encryption Sender

14 Question
il y a 30 secondes
Q.

The Playfair cipher uses a block of plain text, in which each block contains ____ characters.


One

Two

Three

15 Question
il y a 30 secondes
Q.

A Public key size and conventional cryptography’s secret key size are unrelated to one another.


True

False

16 Question
il y a 30 secondes
Q.

An encryption algorithm transforms plain text into:


Cipher text

Simple Text

Empty Text

17 Question
il y a 30 secondes
Q.

The two methods of encrypting data are ________ and _______.


Substitution, transposition

Block, stream

Symmetric, asymmetric

18 Question
il y a 30 secondes
Q.

The hardware-based cryptography depends on the operating system.


True

False

19 Question
il y a 30 secondes
Q.

Block ciphers accumulate symbols in a message of a ______ size.


Fixed

Variable

Integration

20 Question
il y a 30 secondes
Q.

_______ is a message that can be readable by the sender.


Edited

Main Text

Plain text