Search Header Logo

C6 - Quiz

Authored by Instructor Instructor

Instructional Technology

Professional Development

Used 1+ times

C6 - Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?​


confidentiality


authentication

integrity


nonrepudiation

Answer explanation

  • Integrity is ensured by implementing either MD5 or SHA hash generating algorithms. Many modern networks ensure authentication with protocols, such as HMAC. Data confidentiality is ensured through symmetric encryption algorithms, including DES, 3DES, and AES. Data confidentiality can also be ensured using asymmetric algorithms, including RSA and PKI.​

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is another name for confidentiality of information?


privacy

accuracy

consistency

trustworthiness

Answer explanation

  • Privacy is another name for confidentiality. Accuracy, consistency, and trustworthiness describe integrity of data.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

As data is being stored on a local hard disk, which method would secure the data from unauthorized access?

data encryption

a duplicate hard drive copy

deletion of sensitive files


two factor authentication

Answer explanation

  • Data encryption is the process of converting data into a form where only a trusted, authorized person with a secret key or password can decrypt the data and access the original form.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What popular encryption algorithm requires that both the sender and receiver know a pre-shared key?

PKI

MD5

HMAC

AES

Answer explanation

  • MD5 is a hashing algorithm that guarantees that no one intercepted the message and altered it. Advanced Encryption Standard (AES) is a popular symmetric encryption algorithm where each communicating party needs to know the pre-shared key. Public key infrastructure (PKI) is an asymmetric encryption algorithm based on the assumption that the two communicating parties have not previously shared a secret key. HMAC is a hash message authentication code that guarantees that the message is not a forgery and actually comes from the authentic source.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The following message was encrypted using a Caesar cipher with a key of 2:

fghgpf vjg ecuvng

What is the plaintext message?​


defend the region


invade the castle

defend the castle


invade the region

Answer explanation

  • The Caesar cipher was a simple substitution cipher. In this example, if the key is 2, the letter d was moved two spaces to the right, resulting in an encoded message that used the letter f in place of the letter d . The letter g would be the substitute for the letter e , and so on. So, the resulting plaintext is f= d , g= e , h= f , g= e , p= n , f= d , v= t , j= h , g= e , e= c , c= a , u= s , v= t , n= l , g= e .​

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt


What is an example of the one-time pad cipher?

RC4

Rail Fence

Caesar

Vigenere

Answer explanation

  • RC4 is an example of the one-time pad cipher, and it is widely used on the Internet. The Caesar cipher is a simple substitution cipher, and the Vigenère cipher is based on the Caesar cipher. An example of a transposition cipher is the rail fence cipher.​

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In which method used in cryptanalysis does the attacker know a portion of the plaintext and the corresponding ciphertext?​


brute-force

ciphertext

chosen-plaintext​


meet-in-the-middle

Answer explanation

  • There are several methods used in cryptanalysis:

    • Brute-force - The attacker tries every possible key knowing that eventually one of them will work.

    • Ciphertext - The attacker has the ciphertext of several messages encrypted but no knowledge of the underlying plaintext.

    • Known-Plaintext - The attacker has access to the ciphertext of several messages and knows something about the plaintext underlying that ciphertext.

    • Chosen-Plaintext - The attacker chooses which data the encryption device encrypts and observes the ciphertext output.

    • Chosen-Ciphertext - The attacker can choose different ciphertext to be decrypted and has access to the decrypted plaintext.

    • Meet-in-the-Middle - The attacker knows a portion of the plaintext and the corresponding ciphertext.​

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?