Identify the choice that best completes the statement or answers the question. _
ID: 3547867 • Letter: I
Question
Identify the choice that best completes the statement or answers the question.
____ 1. One of the most famous ancient cryptographers was ____.
a. Albert Einstein c. Julius Caesar
b. Isaac Newton d. Caesar Augustus
____ 2. ____ is text that has no formatting (such as bolding or underlining) applied.
a. Plaintext c. Simpletext
b. Plain text d. Simple text
____ 3. ____ ensures that the information is correct and no unauthorized person or malicious software has altered that
data.
a. Confidentiality c. Encryption
b. Availability d. Integrity
____ 4. The most basic type of cryptographic algorithm is a ____ algorithm.
a. hash c. digest
b. key d. block
____ 5. ____ takes plaintext of any length and creates a hash 128 bits long.
a. RSA c. MD5
b. SHA1 d. MD2
____ 6. In MD5, the length of a message is padded to ____ bits.
a. 32 c. 128
b. 64 d. 512
____ 7. ____ is a relatively recent cryptographic hash function that has received international recognition and
adoption by standards organizations, including the International Organization for Standardization (ISO).
a. Twofish c. Whirlpool
b. Blowfish d. Rijndal
____ 8. Symmetric encryption is also called ____ cryptography.
a. private key c. symmetric key
b. public key d. shared key
____ 9. The simplest type of stream cipher is a ____ cipher.
a. shift c. lock
b. substitution d. loop
____ 10. A ____ cipher rearranges letters without changing them.
a. substitution c. loop
b. block d. transposition
____ 11. ____ is designed to replace DES.
a. AES c. 3DES
b. Twofish d. RSA
____ 12. The____ is a symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES.
a. AES b. 3DES
d. Twofish c. RSA
13. The algorithm ____ is a block cipher that operates on 64-bit blocks and can have a key length from 32 to 448
bits.
a. RSA c. Blowfish
b. AES d. 3DES
____ 14. ____ encryption uses two keys instead of only one and these keys are mathematically related.
a. Symmetric c. Shared
b. Asymmetric d. Public key
____ 15. The basis for a digital signature rests on the ability of ____ keys to work in both directions.
a. symmetric c. unique
b. shared d. asymmetric
____ 16. The ____ algorithm is the most common asymmetric cryptography algorithm and is the basis for several
products.
a. AES c. Twofish
b. RSA d. Blowfish
____ 17. A ____ is a number divisible only by itself and 1.
a. prime number c. compound number
b. prime decimal d. neutral number
____ 18. ____ was first proposed in the mid-1980s and it uses sloping curves.
a. FCC c. ECC
b. RSA d. IKE
19. ____ attempts to use the unusual and unique behavior of microscopic objects to enable users to securely
develop and share keys as well as to detect eavesdropping.
a. Reactive cryptography c. Analog cryptography
b. Symmetric cryptography d. Quantum cryptography
____ 20. NTRUEncrypt uses ____ cryptography that relies on a set of points in space.
a. matrix-based c. linear
b. lattice-based d. quantum
____ 21. The ____ is essentially a chip on the motherboard of the computer that provides cryptographic services.
a. TPM c. reference monitor
b. SCM d. ODS
____ 22. ____ can be used to ensure the integrity of a file by guaranteeing that no one has tampered with it.
a. Blocking c. Encrypting
b. Hashing d. Cloning
____ 23. ____ can protect the confidentiality of an e-mail message by ensuring that no one has read it.
a. Public encryption c. Asymmetric encryption
b. Standard encryption d. Symmetric encryption
____ 24. ____ can verify the authenticity of the sender and enforce nonrepudiation to prove that the sender is who he
claims to be and cannot deny sending it.
a. Symmetric encryption c. Asymmetric encryption
b. Private encryption d. Elliptic encryption
Explanation / Answer
1.c. Julius Caesar
2.a. Plaintext
3. d. Integrity
4.a. hash
5. d. MD2
6.d. 512
7.a. Twofish
8.a. private key
9.b. substitution
10.d. transposition
11.d. RSA
12.a. AES
13.c. Blowfish
14.b. Asymmetric
15.d. asymmetric
16.a. AES
17.a. prime number
18.c. ECC
19.d. Quantum cryptography
20.b. lattice-based
21.a. TPM
22.b. Hashing
23.d. Symmetric encryption
24.c. Asymmetric encryption