Search Header Logo

Cryptography and Network Security Quiz3

Authored by azooz_dhamri azooz_dhamri

Computers

University

Cryptography and Network Security Quiz3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the study of principles/methods of deciphering ciphertext without knowing the key?

Cryptanalysis

Steganography

Cryptology

Cryptography

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the size of plaintext in AES algorithm?

512 bits

64 bits

256 bits

128 bits

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the last step in DES encryption?

Expansion Permutation

Inverse Initial Permutation

Final Permutation

Key Generation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many keys are required for two people to communicate via asymmetric cipher?

4

2

1

3

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Hill cipher?

Stream cipher

Transposition cipher

Polygraphic substitution cipher

Shift cipher

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who invented the Vernam Cipher?

Alan Turing

Gilbert Vernam

Ron Rivest

Whitfield Diffie

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Columnar Transpositions?

Rearrangement of characters into rows

Rearrangement of characters into columns

Rearrangement of characters into a grid

Rearrangement of characters into a circle

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers