CEH Study Guide - 13 Cryptography

Quiz
•
Computers
•
Professional Development
•
Hard

Alejandro Hidalgo
Used 12+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
With a rotation of 4, what does erwaiv decrypt to?
waive
wave
answer
decrypt
Answer explanation
This is a rotation cipher with a key of 4. When you rotate the alphabet by 4, you end up
with e = a, r = n, w = s, and so on. In addition to not being the right decryption, none of the
others have the correct number of letters. In a substitution cipher like a rotation cipher, you
will always have the same number of letters in the output as you do in the input
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do you call a message before it is encrypted?
Text
Plain text
Bare words
Bare text
Answer explanation
In cryptography, any data or message that is in an unencrypted state is called plaintext.
The output from a cryptographic process is ciphertext. While you may have text as input
to an encryption process, the word text would be ambiguous in this context. The other two
are unrelated to cryptography.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does PGP use to verify identity?
Central authority
Web of users
Web of trust
Central trust authority
Answer explanation
Where certificate authorities use a centralized mechanism for verification of users or
certificate subjects, PGP uses a decentralized model. PGP calls this a web of trust, where
individual users sign keys that belong to other people to validate that they are who they say
they are. All of the other answers are made-up terms.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What principle is used to demonstrate that a signed message came from the owner of the key that signed it?
Non-repudiation
Non-verifiability
Integrity
Authority
Answer explanation
Integrity is part of the CIA triad but isn’t the principle that ties a signed message back
to the subject of the signing certificate. Non-verifiability is nonsense, and authority isn’t
relevant here. Instead, non-repudiation means someone can’t say they didn’t send a message
if it was signed with their key. This assumes the key was in their possession and password
protected, meaning no one else could use it.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Diffie-Hellman used for?
Key management
Key isolation
Key exchange
Key revocation
Answer explanation
Certificates can be revoked but that’s not what Diffie-Hellman is used for. Key
management is a much broader topic than key exchange, which is what Diffie-Hellman is
used for. It is a process that allows two parties to an encrypted conversation to mutually
derive the same key starting with the same base value.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How did 3DES improve on DES?
Made the key longer
Used two keys
Changed algorithms
Used three keys
Answer explanation
3DES, or Triple DES, uses three keys. The first key is used to encrypt the plaintext. The
second key is used to decrypt the ciphertext resulting from the first round of encryption.
Finally, the third key is used to encrypt the ciphertext that resulted from the decryption
with the second key. The key wasn’t made longer because the 168 bits used in 3DES aren’t
used in a single key. The underlying DES algorithm is still used.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What improvement does elliptic curve cryptography make?
Smaller keys improve speed
Algorithm is more complex
Doesn't use factoring, which is better
Longer keys
Answer explanation
Algorithms used for elliptic curve cryptography are not more complex, necessarily.
While they don’t use factoring, that fact alone doesn’t necessarily make the algorithms
better. Instead, elliptic curve cryptography relies on the assumption that determining a
discrete logarithm of a point on an elliptic curve can’t be computed in a consistent way. The
keys that result from elliptic key cryptography are actually smaller than those that result
from factoring with large prime numbers
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Encryption Quiz

Quiz
•
Professional Development
15 questions
QUIZZ 3 AIJ XII TKJ

Quiz
•
Professional Development
15 questions
Distributed Consensus

Quiz
•
Professional Development
20 questions
Database Basics

Quiz
•
Professional Development
15 questions
Soal Meet 3 Database Management

Quiz
•
Professional Development
12 questions
BCS Programming - 1 Implementing Code

Quiz
•
Professional Development
10 questions
Mongodb Basics

Quiz
•
Professional Development
15 questions
Quiz sobre Storage

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
11 questions
All about me

Quiz
•
Professional Development
10 questions
How to Email your Teacher

Quiz
•
Professional Development
15 questions
Fun Random Trivia

Quiz
•
Professional Development
22 questions
Anne Bradstreet 1612-1672

Quiz
•
Professional Development
18 questions
Spanish Speaking Countries and Capitals

Quiz
•
KG - Professional Dev...
14 questions
Fall Trivia

Quiz
•
11th Grade - Professi...
15 questions
Disney Characters Quiz

Quiz
•
Professional Development
15 questions
Quiz to Highlight Q types & other great features in Wayground

Quiz
•
Professional Development