<< Prev Question Next Question >>

Question 7/74

Original, unencrypted information is referred to as ____.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (74q)
Question 1: Basic information theory is the basis for modern symmetric c...
Question 2: Which of the following algorithms uses three different keys ...
Question 3: Which of the following is generally true about key sizes?...
Question 4: Which of the following statements is most true regarding bin...
Question 5: Which one of the following uses three different keys, all of...
Question 6: With Cipher feedback (CFB) what happens?...
Question 7: Original, unencrypted information is referred to as ____....
Question 8: Which of the following asymmetric algorithms is described by...
Question 9: A _____ is a function is not reversible....
Question 10: Calculates the average LSB and builds a table of frequencies...
Question 11: Asymmetric encryption method developed in 1984. It is used i...
Question 12: Which of the following Secure Hashing Algorithm (SHA) produc...
Question 13: Bob's password is hashed, and so is John's. Even though they...
Question 14: Storing private keys with a third party is referred to as wh...
Question 15: If the round function is a cryptographically secure pseudora...
Question 16: John is trying to explain the basics of cryptography to a gr...
Question 17: This is a 128 bit hash that is specified by RFC 1321. It was...
Question 18: Which of the following is the successor of SSL?...
Question 19: With Electronic codebook (ECB) what happens:...
Question 20: What advantage do symmetric algorithms have over asymmetric ...
Question 21: Cylinder tool. Wrap leather around to decode. The diameter i...
Question 22: A number that is used only one time, then discarded is calle...
Question 23: Which of the following uses an 80 bit key on 64 bit blocks?...
Question 24: What is a TGS?
Question 25: In a Feistel cipher, the two halves of the block are swapped...
Question 26: Which of the following equations is related to EC?...
Question 27: The art and science of writing hidden messages so that no on...
Question 28: What is the largest key size that AES can use?...
Question 29: What best describes the shifting of each letter a fixed numb...
Question 30: This algorithm was published by the German engineering firm ...
Question 31: During the process of encryption and decryption, what keys a...
Question 32: The mode makes a block cipher into a synchronous stream ciph...
Question 33: What is the name of the attack where the attacker obtains th...
Question 34: If you XOR 10111000 with 10101010, what is the result?...
Question 35: Denis is looking at an older system that uses DES encryption...
Question 36: What is a "Collision attack" in cryptography?...
Question 37: Which of the following is a key exchange protocol?...
Question 38: Protocol suite provides a method of setting up a secure chan...
Question 39: Which of the following is a substitution cipher used by anci...
Question 40: The next number is derived from adding together the prior tw...
Question 41: RFC 1321 describes what hash?
Question 42: In steganography, ________ is the data to be covertly commun...
Question 43: Which of the following was a multi alphabet cipher widely us...
Question 44: In a ______ the attacker discovers a functionally equivalent...
Question 45: Which of the following is not a key size used by AES?...
Question 46: The reverse process from encoding - converting the encoded m...
Question 47: Which one of the following is an example of a symmetric key ...
Question 48: How did the ATBASH cipher work?...
Question 49: What is the formula m^e %n related to?...
Question 50: Juanita is attempting to hide some text into a jpeg file. Hi...
Question 51: How can rainbow tables be defeated?...
Question 52: Which of the following is assured by the use of a hash?...
Question 53: Which one of the following terms describes two numbers that ...
Question 54: What is a variation of DES that uses a technique called Key ...
Question 55: You have been tasked with selecting a digital certificate st...
Question 56: In IPSec, if the VPN is a gateway-gateway or a host-gateway,...
Question 57: In 1977 researchers and MIT described what asymmetric algori...
Question 58: An authentication method that periodically re-authenticates ...
Question 59: Jane is looking for an algorithm to ensure message integrity...
Question 60: Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adlem...
Question 61: Manipulating individuals so that they will divulge confident...
Question 62: What size block does AES work on?...
Question 63: A cryptanalysis success where the attacker deduces the secre...
Question 64: Which of the following is a block cipher?...
Question 65: Cryptographic hashes are often used for message integrity an...
Question 66: A real time protocol for verifying certificates (and a newer...
Question 67: WPA2 uses AES for wireless data encryption at which of the f...
Question 68: Encryption of the same plain text with the same key results ...
Question 69: Frank is trying to break into an encrypted file... He is att...
Question 70: A 160-bit hash algorithm developed by Hans Dobbertin, Antoon...
Question 71: Ahlen is using a set of pre-calculated hashes to attempt to ...
Question 72: Which one of the following attempts to hide data in plain vi...
Question 73: Network of trusted certificate authority servers. Use asymme...
Question 74: In relationship to hashing, the term _____refers to random b...