Q.1
What is encryption?
  • When you put data / text into code making it difficult to read or understand.
  • A secret or disguised way of writing; a code.
  • A formal language designed to communicate instructions to a machine
  • What is put in, taken in, or operated on by any process or system.
Q.2
Plaintext
  • original message
  • coded message
  • algorithm for transforming plaintext to ciphertext
  • info used in cipher known only to sender/receiver
Q.3
What does Firewall Do?
  • Prevents Hackers
  • Install Viruses
  • Give you SD cards
  • Blocks all content
Q.4
Encrypted text
  • Ciphertext
  • Plaintext
  • Algorithm
  • Cipher
Q.5
What alternative term can be used to describe asymmetric cryptographic algorithms?
  • public key cryptography
  • user key cryptography
  • private key cryptography
  • cipher-text cryptography
Q.6
DES follows
  • Hash Algorithm
  • Caesars Cipher
  • Feistel Cipher Structure
  • SP Networks
Q.7
Encrypt the word alphabet using a Caesar cipher with a shift of 3
  • DVSDULQV
  • DOOFOHDU
  • DOSKDEHW
  • DORQHBHV
Q.8
What is the term used to describe the science of making and breaking secret codes?
  • impersonation
  • factorization
  • jamming
  • cryptology
  • spoofing
Q.9
In Rotation Cipher, keyless rotation the number of rotations is
  • Jammed
  • Idle
  • Rotating
  • Fixed
Q.10
An encryption algorithm transforms plain text into:
  • Cipher text
  • Simple Text
  • Empty Text
  • Plain Text
Q.11
What encryption algorithm uses one key to encrypt data and a different key to decrypt data?
  • symmetric
  • transposition
  • one-time pad
  • asymmetric
Q.12
Cryptography supports all of the core principles of information security except
  • Availability
  • Confidentiality
  • Integrity
  • Authenticity
Q.13
A Caesar cipher is an example of a ______________________.
  • transposition cipher
  • bimodal cipher
  • substitution cipher
  • substantial cipher
Q.14
What are three examples of administrative access controls? (Choose three.)
  • encryption
  • hiring practices
  • background checks
  • guard dogs
  • policies and procedures
Q.15
Which asymmetric algorithm provides an electronic key exchange method to share the secret key?
  • Diffie-Hellman
  • hashing
  • RSA
  • DES
  • WEP
Q.16
The two methods of encrypting data are?
  • Substitution and transposition
  • Block and stream
  • Symmetric and asymmetric
  • DES and AES
Q.17
In which type of encryption is the same key used to encrypt and decrypt data?
  • public
  • asymmetric
  • symmetric
  • private
Q.18
"CAESAR CIPHER" has been encrypted with Caesar cipher to "SQUIQH SYFXUH". The key used was:
  • 16
  • 14
  • 13
  • 12
Q.19
"CIPHERTEXT" has been encrypted with Caesar cipher to "EKRJGTVGZV". The key used was:
  • 7
  • 6
  • 3
  • 2
Q.20
"PLAINTEXT" has been encrypted with Caesar cipher to "AWLTYEPIE". The key used was:
  • 16
  • 12
  • 11
  • 19
0 h : 0 m : 1 s