Search Header Logo

IAS CH3 QUIZ

Authored by Darwin Vargas

Computers

University

Used 1+ times

IAS CH3 QUIZ
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The vast majority of network based symmetric cryptographic applications make use of stream ciphers.

TRUE

FALSE

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DES uses a 56-bit block and a 64-bit key.

TRUE

FALSE

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If the bit-stream generator is a key-controlled algorithm the two

users only need to share the generating key and then each can

produce the keystream.

TRUE

FALSE

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A problem with the ideal block cipher using a small block size is

that it is vulnerable to a statistical analysis of the plaintext.

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Confusion seeks to make the statistical relationship between the

plaintext and ciphertext as complex as possible in order to thwart

attempts to deduce the key.

TRUE

FALSE

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All other things being equal, smaller block sizes mean greater

security.

TRUE

FALSE

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Greater complexity in the subkey generation algorithm should lead

to greater difficulty of cryptanalysis.

TRUE

FALSE

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?