
C6 - Quiz
Authored by Instructor Instructor
Instructional Technology
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
23 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?
confidentiality
authentication
integrity
nonrepudiation
Answer explanation
Integrity is ensured by implementing either MD5 or SHA hash generating algorithms. Many modern networks ensure authentication with protocols, such as HMAC. Data confidentiality is ensured through symmetric encryption algorithms, including DES, 3DES, and AES. Data confidentiality can also be ensured using asymmetric algorithms, including RSA and PKI.
Integrity is ensured by implementing either MD5 or SHA hash generating algorithms. Many modern networks ensure authentication with protocols, such as HMAC. Data confidentiality is ensured through symmetric encryption algorithms, including DES, 3DES, and AES. Data confidentiality can also be ensured using asymmetric algorithms, including RSA and PKI.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is another name for confidentiality of information?
privacy
accuracy
consistency
trustworthiness
Answer explanation
Privacy is another name for confidentiality. Accuracy, consistency, and trustworthiness describe integrity of data.
Privacy is another name for confidentiality. Accuracy, consistency, and trustworthiness describe integrity of data.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
As data is being stored on a local hard disk, which method would secure the data from unauthorized access?
data encryption
a duplicate hard drive copy
deletion of sensitive files
two factor authentication
Answer explanation
Data encryption is the process of converting data into a form where only a trusted, authorized person with a secret key or password can decrypt the data and access the original form.
Data encryption is the process of converting data into a form where only a trusted, authorized person with a secret key or password can decrypt the data and access the original form.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What popular encryption algorithm requires that both the sender and receiver know a pre-shared key?
PKI
MD5
HMAC
AES
Answer explanation
MD5 is a hashing algorithm that guarantees that no one intercepted the message and altered it. Advanced Encryption Standard (AES) is a popular symmetric encryption algorithm where each communicating party needs to know the pre-shared key. Public key infrastructure (PKI) is an asymmetric encryption algorithm based on the assumption that the two communicating parties have not previously shared a secret key. HMAC is a hash message authentication code that guarantees that the message is not a forgery and actually comes from the authentic source.
MD5 is a hashing algorithm that guarantees that no one intercepted the message and altered it. Advanced Encryption Standard (AES) is a popular symmetric encryption algorithm where each communicating party needs to know the pre-shared key. Public key infrastructure (PKI) is an asymmetric encryption algorithm based on the assumption that the two communicating parties have not previously shared a secret key. HMAC is a hash message authentication code that guarantees that the message is not a forgery and actually comes from the authentic source.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The following message was encrypted using a Caesar cipher with a key of 2:
fghgpf vjg ecuvng
What is the plaintext message?
defend the region
invade the castle
defend the castle
invade the region
Answer explanation
The Caesar cipher was a simple substitution cipher. In this example, if the key is 2, the letter d was moved two spaces to the right, resulting in an encoded message that used the letter f in place of the letter d . The letter g would be the substitute for the letter e , and so on. So, the resulting plaintext is f= d , g= e , h= f , g= e , p= n , f= d , v= t , j= h , g= e , e= c , c= a , u= s , v= t , n= l , g= e .
The Caesar cipher was a simple substitution cipher. In this example, if the key is 2, the letter d was moved two spaces to the right, resulting in an encoded message that used the letter f in place of the letter d . The letter g would be the substitute for the letter e , and so on. So, the resulting plaintext is f= d , g= e , h= f , g= e , p= n , f= d , v= t , j= h , g= e , e= c , c= a , u= s , v= t , n= l , g= e .
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is an example of the one-time pad cipher?
RC4
Rail Fence
Caesar
Vigenere
Answer explanation
RC4 is an example of the one-time pad cipher, and it is widely used on the Internet. The Caesar cipher is a simple substitution cipher, and the Vigenère cipher is based on the Caesar cipher. An example of a transposition cipher is the rail fence cipher.
RC4 is an example of the one-time pad cipher, and it is widely used on the Internet. The Caesar cipher is a simple substitution cipher, and the Vigenère cipher is based on the Caesar cipher. An example of a transposition cipher is the rail fence cipher.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
In which method used in cryptanalysis does the attacker know a portion of the plaintext and the corresponding ciphertext?
brute-force
ciphertext
chosen-plaintext
meet-in-the-middle
Answer explanation
There are several methods used in cryptanalysis:
Brute-force - The attacker tries every possible key knowing that eventually one of them will work.
Ciphertext - The attacker has the ciphertext of several messages encrypted but no knowledge of the underlying plaintext.
Known-Plaintext - The attacker has access to the ciphertext of several messages and knows something about the plaintext underlying that ciphertext.
Chosen-Plaintext - The attacker chooses which data the encryption device encrypts and observes the ciphertext output.
Chosen-Ciphertext - The attacker can choose different ciphertext to be decrypted and has access to the decrypted plaintext.
Meet-in-the-Middle - The attacker knows a portion of the plaintext and the corresponding ciphertext.
There are several methods used in cryptanalysis:
Brute-force - The attacker tries every possible key knowing that eventually one of them will work.
Ciphertext - The attacker has the ciphertext of several messages encrypted but no knowledge of the underlying plaintext.
Known-Plaintext - The attacker has access to the ciphertext of several messages and knows something about the plaintext underlying that ciphertext.
Chosen-Plaintext - The attacker chooses which data the encryption device encrypts and observes the ciphertext output.
Chosen-Ciphertext - The attacker can choose different ciphertext to be decrypted and has access to the decrypted plaintext.
Meet-in-the-Middle - The attacker knows a portion of the plaintext and the corresponding ciphertext.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
MCSA -Mid Exam
Quiz
•
Professional Development
20 questions
CPA Prelims JY 2022
Quiz
•
8th Grade - Professio...
18 questions
(elem) Technology Routines
Quiz
•
Professional Development
20 questions
Dashboard Rules
Quiz
•
Professional Development
20 questions
FUN 101 Week 7 Test Bearings, Lubricants & Seals
Quiz
•
Professional Development
20 questions
Tech Talk elementary Units 4-7-8
Quiz
•
Professional Development
18 questions
ACTIVIDAD 3.1.5 TERMINOS DE DELITOS INFORMATICOS
Quiz
•
Professional Development
21 questions
Actúa - Informática Nivel Básico
Quiz
•
3rd Grade - Professio...
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Instructional Technology
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
12 questions
Mardi Gras Trivia
Quiz
•
Professional Development
7 questions
Copy of G5_U5_L14_22-23
Lesson
•
KG - Professional Dev...
12 questions
Unit 5: Puerto Rico W1
Quiz
•
Professional Development
42 questions
LOTE_SPN2 5WEEK2 Day 4 We They Actividad 3
Quiz
•
Professional Development
15 questions
Balance Equations Hangers
Quiz
•
Professional Development
31 questions
Servsafe Food Manager Practice Test 2021- Part 1
Quiz
•
9th Grade - Professio...