
CSF 6.7 Assessment Review - Cryptology
Flashcard
•
Computers
•
9th - 12th Grade
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Student preview

9 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Which image best portrays your current mood?
Back
undefined
2.
FLASHCARD QUESTION
Front
The art of making and breaking code is called what?
Back
Cryptography
Answer explanation
The correct answer is:
Cryptography
Explanation: Cryptography is the practice and study of techniques for secure communication in the presence of third parties, often referred to as adversaries. It involves creating and analyzing protocols that prevent third parties from reading private messages, ensuring secure communication, and data integrity. Cryptography includes both encryption (making code) and decryption (breaking code) techniques.
Incorrect Answers:
Encryption in-transit: Encryption in-transit refers to the process of encrypting data while it is being transmitted over a network. It ensures that data remains secure and private while in transit between two communicating parties. However, it specifically focuses on protecting data during transmission and does not encompass the broader concept of cryptography, which includes both encryption and decryption techniques.
Encryption at-rest: Encryption at-rest involves encrypting data stored on physical or digital storage devices, such as hard drives, solid-state drives, or databases. It ensures that data remains secure and protected even when it is not actively being used. Like encryption in-transit, encryption at-rest is a specific application of cryptography focused on protecting data at rest, but it does not encompass the entirety of the field of cryptography.
Decryption: Decryption is the process of converting encrypted data back into its original, readable form. While decryption is an essential component of cryptography, particularly for authorized parties to access encrypted data, it specifically refers to the reverse process of encryption. It is not the art of making and breaking code itself but rather the process of reversing encryption to retrieve the original plaintext from encrypted data.
3.
FLASHCARD QUESTION
Front
Which of the following is true about encryption in transit? Options: It encrypts data at rest, protecting it from unauthorized access. It encrypts data as it moves between two systems, protecting it from interception during transit. It encrypts data as it is being processed by a computer, protecting it from malicious code. It encrypts data stored in the cloud, protecting it from unauthorized access.
Back
It encrypts data as it moves between two systems, protecting it from interception during transit.
Answer explanation
The correct answer is:
It encrypts data as it moves between two systems, protecting it from interception during transit.
Explanation: Encryption in transit involves encrypting data as it is transmitted between two systems or devices over a network. This process ensures that data remains secure and protected from interception by unauthorized parties while it is in motion.
Let's address the incorrect options:
It encrypts data at rest, protecting it from unauthorized access: This statement describes encryption at rest rather than encryption in transit. Encryption at rest involves encrypting data when it is stored on physical or digital storage devices to protect it from unauthorized access when not in use.
It encrypts data as it is being processed by a computer, protecting it from malicious code: This statement refers to another concept known as runtime encryption or memory encryption, which involves encrypting data while it is being processed by a computer's CPU or memory to protect it from malicious code or unauthorized access. It does not specifically relate to encryption in transit.
It encrypts data stored in the cloud, protecting it from unauthorized access: This statement describes encryption at rest rather than encryption in transit. While data stored in the cloud may indeed be encrypted to protect it from unauthorized access when stored on cloud servers, encryption in transit specifically pertains to encrypting data as it moves between systems over a network.
4.
FLASHCARD QUESTION
Front
Which of the following best describes encryption at rest? Options: It encrypts data as it moves between two systems, protecting it from interception during transit. It encrypts data stored in a computer's memory, protecting it from unauthorized access. It encrypts data as it is being processed by a computer, protecting it from malicious code. It encrypts data stored on a device or server, protecting it from unauthorized access.
Back
It encrypts data stored on a device or server, protecting it from unauthorized access.
Answer explanation
Here are explanations for the other incorrect answers:
Encryption in transit: It encrypts data as it moves between two systems, protecting it from interception during transit. This is the correct definition of encryption in transit. It is used to protect data as it travels over a network, such as the internet, from being intercepted and read by unauthorized third parties.
Encryption in memory: It encrypts data stored in a computer's memory, protecting it from unauthorized access. While it is important to protect data in memory, it is not referred to as encryption at rest. Encryption in memory is used to protect sensitive data, such as passwords and encryption keys, from being accessed by unauthorized processes running on the same computer.
Encryption in processing: It encrypts data as it is being processed by a computer, protecting it from malicious code. Encryption in processing is not a common term, but there are techniques used to protect data during processing, such as homomorphic encryption. However, it is not considered encryption at rest.
5.
FLASHCARD QUESTION
Front
The first form of cryptography can be traced back to when?
Back
Egyptians with hieroglyphics
Answer explanation
The first form of cryptography can be traced back to the Egyptians with hieroglyphics. They used simple substitution ciphers to encode their messages, and this is considered to be one of the earliest known examples of cryptography. The Egyptians used hieroglyphics to convey secret messages, but they also used them for non-secret communications, such as religious texts and historical records. The other options mentioned in the question are not accurate in terms of the history of cryptography. ARPANET and the World Wide Web are both related to the development of the internet, but they are not directly related to the history of cryptography. The Cold War also played a significant role in the development of modern cryptography, but it did not mark the beginning of cryptography as a practice.
6.
FLASHCARD QUESTION
Front
What are the two types of methods to encrypt data?
Back
symmetric and asymmetric
Answer explanation
The correct answer is:
Symmetric and asymmetric
Explanation:
Symmetric encryption: Symmetric encryption, also known as secret-key encryption, involves the use of a single key for both encryption and decryption of data. The same key is used by both the sender and the recipient to encrypt and decrypt messages. Symmetric encryption algorithms are typically faster and more efficient than asymmetric encryption but require a secure method for exchanging the secret key.
Asymmetric encryption: Asymmetric encryption, also known as public-key encryption, utilizes a pair of keys: a public key and a private key. The public key is used for encryption, while the private key is used for decryption. The public key can be freely distributed, allowing anyone to encrypt messages intended for the owner of the private key, but only the owner of the private key can decrypt these messages. Asymmetric encryption provides a secure method for exchanging messages without the need for a shared secret key. However, it is generally slower and more computationally intensive than symmetric encryption.
7.
FLASHCARD QUESTION
Front
A process of converting encrypted data into a form that is readable and understood by a human or a computer is called?
Back
decryption
Answer explanation
Decryption
Explanation:
Decryption is the process of converting encrypted data back into its original, readable form. It involves using a decryption key or algorithm to reverse the encryption process and recover the plaintext from the ciphertext. Decryption is the opposite of encryption, which transforms plaintext into ciphertext to secure data.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?