CEH Study Guide - 13 Cryptography

CEH Study Guide - 13 Cryptography

Professional Development

15 Qs

quiz-placeholder

Similar activities

1.4 Cryptography

1.4 Cryptography

Professional Development

10 Qs

DST07 - Day 2 quiz

DST07 - Day 2 quiz

Professional Development

10 Qs

Cryptography

Cryptography

Professional Development

17 Qs

Fundamentals of Cryptography Quiz

Fundamentals of Cryptography Quiz

Professional Development

20 Qs

Digital Investigation Quiz

Digital Investigation Quiz

Professional Development

10 Qs

Its Network Security

Its Network Security

Professional Development

15 Qs

Linux Essentials Quiz 2

Linux Essentials Quiz 2

Professional Development

11 Qs

CB3491 CCS MCQ

CB3491 CCS MCQ

Professional Development

10 Qs

CEH Study Guide - 13 Cryptography

CEH Study Guide - 13 Cryptography

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Alejandro Hidalgo

Used 9+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

With a rotation of 4, what does erwaiv decrypt to?

waive

wave

answer

decrypt

Answer explanation

This is a rotation cipher with a key of 4. When you rotate the alphabet by 4, you end up

with e = a, r = n, w = s, and so on. In addition to not being the right decryption, none of the

others have the correct number of letters. In a substitution cipher like a rotation cipher, you

will always have the same number of letters in the output as you do in the input

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do you call a message before it is encrypted?

Text

Plain text

Bare words

Bare text

Answer explanation

In cryptography, any data or message that is in an unencrypted state is called plaintext.

The output from a cryptographic process is ciphertext. While you may have text as input

to an encryption process, the word text would be ambiguous in this context. The other two

are unrelated to cryptography.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does PGP use to verify identity?

Central authority

Web of users

Web of trust

Central trust authority

Answer explanation

Where certificate authorities use a centralized mechanism for verification of users or

certificate subjects, PGP uses a decentralized model. PGP calls this a web of trust, where

individual users sign keys that belong to other people to validate that they are who they say

they are. All of the other answers are made-up terms.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What principle is used to demonstrate that a signed message came from the owner of the key that signed it?

Non-repudiation

Non-verifiability

Integrity

Authority

Answer explanation

Integrity is part of the CIA triad but isn’t the principle that ties a signed message back

to the subject of the signing certificate. Non-verifiability is nonsense, and authority isn’t

relevant here. Instead, non-repudiation means someone can’t say they didn’t send a message

if it was signed with their key. This assumes the key was in their possession and password

protected, meaning no one else could use it.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Diffie-Hellman used for?

Key management

Key isolation

Key exchange

Key revocation

Answer explanation

Certificates can be revoked but that’s not what Diffie-Hellman is used for. Key

management is a much broader topic than key exchange, which is what Diffie-Hellman is

used for. It is a process that allows two parties to an encrypted conversation to mutually

derive the same key starting with the same base value.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How did 3DES improve on DES?

Made the key longer

Used two keys

Changed algorithms

Used three keys

Answer explanation

3DES, or Triple DES, uses three keys. The first key is used to encrypt the plaintext. The

second key is used to decrypt the ciphertext resulting from the first round of encryption.

Finally, the third key is used to encrypt the ciphertext that resulted from the decryption

with the second key. The key wasn’t made longer because the 168 bits used in 3DES aren’t

used in a single key. The underlying DES algorithm is still used.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What improvement does elliptic curve cryptography make?

Smaller keys improve speed

Algorithm is more complex

Doesn't use factoring, which is better

Longer keys

Answer explanation

Algorithms used for elliptic curve cryptography are not more complex, necessarily.

While they don’t use factoring, that fact alone doesn’t necessarily make the algorithms

better. Instead, elliptic curve cryptography relies on the assumption that determining a

discrete logarithm of a point on an elliptic curve can’t be computed in a consistent way. The

keys that result from elliptic key cryptography are actually smaller than those that result

from factoring with large prime numbers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?