Chapter 8 Flashcards

Encryption (18 cards)

1
Q
  1. It is important to understand the concepts and application of cryptography. Which of the following most accurately defines encryption?
    A. Changing a message so it can only be easily read by the intended recipient
    B. Using complex mathematics to conceal a message
    C. Changing a message using complex mathematics
    D. Applying keys to a message to conceal it
A

A. Changing a message so it can only be easily read by the intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which of the following is the oldest encryption method discussed in this text?
    A. PGP
    B. Multi-alphabet encryption
    C. Caesar cipher
    D. Cryptic cipher
A

C. Caesar cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Many classic ciphers are easy to understand but not secure. What is the main problem with simple substitution?
    A. It does not use complex mathematics.
    B. It is easily broken with modern computers.
    C. It is too simple.
    D. It maintains letter and word frequency.
A

D. It maintains letter and word frequency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Classic ciphers were improved with the addition of multiple shifts (multiple substitution alphabets). Which of the following is an encryption method that uses two or more different shifts?
    A. Caesar cipher
    B. Multi-alphabet encryption
    C. DES
    D. PGP
A

B. Multi-alphabet encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Which binary mathematical operation can be used for a simple (but unsecured) encryption method and is in fact a part of modern symmetric ciphers?
    A. Bit shift
    B. OR
    C. XOR
    D. Bit swap
A

C. XOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Why is binary mathematical encryption not secure?
    A. It does not change letter or word frequency.
    B. It leaves the message intact.
    C. It is too simple.
    D. The mathematics of it is flawed.
A

A. It does not change letter or word frequency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Which of the following is most true regarding binary operations and encryption?
    A. They are completely useless.
    B. They can form a part of viable encryption methods.
    C. They are only useful as a teaching method.
    D. They can provide secure encryption.
A

B. They can form a part of viable encryption methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. What is PGP?
    A. Pretty Good Privacy, a public key encryption method
    B. Pretty Good Protection, a public key encryption method
    C. Pretty Good Privacy, a symmetric key encryption method
    D. Pretty Good Protection, a symmetric key encryption method
A

A. Pretty Good Privacy, a public key encryption method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Which of the following methods is available as an add-in for most email clients?
    A. DES
    B. RSA
    C. Caesar cipher
    D. PGP
A

D. PGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Which of the following is a symmetric key system that uses 64-bit blocks?
    A. RSA
    B. DES
    C. PGP
    D. Blowfish
A

B. DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. What is the advantage of a symmetric key system using 64-bit blocks?
    A. It is fast.
    B. It is unbreakable.
    C. It uses asymmetric keys.
    D. It is complex.
A

A. It is fast.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. What size key does a DES system use?
    A. 64 bit
    B. 128 bit
    C. 56 bit
    D. 256 bit
A

C. 56 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What type of encryption uses different keys to encrypt and decrypt the message?
    A. Private key
    B. Public key
    C. Symmetric
    D. Secure
A

B. Public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Which of the following methods uses a variable-length symmetric key?
    A. Blowfish
    B. Caesar
    C. DES
    D. RSA
A

A. Blowfish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. What should you be most careful of when looking for an encryption method to use?
    A. Complexity of the algorithm
    B. Veracity of the vendor’s claims
    C. Speed of the algorithm
    D. How long the algorithm has been around
A

D. How long the algorithm has been around

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Which of the following is most likely to be true of an encryption method that is advertised as unbreakable?
    A. It is probably suitable for military use.
    B. It may be too expensive for your organization.
    C. It is likely to be exaggerated.
    D. It is probably one you want to use.
A

C. It is likely to be exaggerated.

17
Q
  1. Which of the following is most true regarding certified encryption methods?
    A. These are the only methods you should use.
    B. It depends on the level of certification.
    C. It depends on the source of the certification.
    D. There is no such thing as certified encryption.
A

D. There is no such thing as certified encryption.

18
Q
  1. Which of the following is most true regarding new encryption methods?
    A. Never use them until they have been proven.
    B. You can use them, but you must be cautious.
    C. Use them only if they are certified.
    D. Use them only if they are rated unbreakable.
A

A. Never use them until they have been proven.