Deck 8: Cryptography Terminology and Techniques
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
Play
Full screen (f)
Deck 8: Cryptography Terminology and Techniques
1
A hacker guessing suggested password to a program is call as?
A)password guessing
B)dictionary attack
C)default password attack
D)none of these
A)password guessing
B)dictionary attack
C)default password attack
D)none of these
default password attack
2
Symmetric key encryption is also called as?
A)public key encryption
B)private key encryption
C)both of these
D)none of these
A)public key encryption
B)private key encryption
C)both of these
D)none of these
private key encryption
3
Conversion of Cypher text to plain text?
A)encryption
B)decryption
C)simple text
D)none of these
A)encryption
B)decryption
C)simple text
D)none of these
decryption
4
__is used to create the organisation's overall security program.
A)program policy
B)purpose
C)security
D)none of these
A)program policy
B)purpose
C)security
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
An act of protecting information from unauthorised disclouser to an entity.-
A)intergrity
B)avability
C)confidentiality
D)none of these
A)intergrity
B)avability
C)confidentiality
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
A way to ensure that the entity is indeed what it claims to be.-
A)authentication
B)accountability
C)identification
D)security
A)authentication
B)accountability
C)identification
D)security
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
The__model is 7 layer architecture where each layer is having some specific functionality to perform.
A)tcp
B)osi
C)ois
D)none of these
A)tcp
B)osi
C)ois
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
The full form of OSI is OSI model__.
A)open systems interconnection
B)open software interconnection
C)open connection
D)open system internet
A)open systems interconnection
B)open software interconnection
C)open connection
D)open system internet
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
The technique in which when one character is replaced by another Character is called as?
A)transposition
B)substitution
C)combinational
D)none of these
A)transposition
B)substitution
C)combinational
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
Conversion of plain text into Cipher text is called as________.
A)encryption
B)decryption
C)hidden text
D)none of above
A)encryption
B)decryption
C)hidden text
D)none of above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
In Symmetric schemes requires both parties to share how many secret key?
A)one
B)two
C)three
D)four
A)one
B)two
C)three
D)four
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
Blum Blum Shub Generator is based on which Algorithm?
A)private key
B)public key
C)both a & b
D)none of these
A)private key
B)public key
C)both a & b
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
In DES step both LPT and RPT undergoes in how much key Rounds?
A)8
B)16
C)32
D)64
A)8
B)16
C)32
D)64
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
What is the 4th step in DES Algorithm?
A)key transformation
B)s-box substitution
C)p-box permutation
D)expansion permutation
A)key transformation
B)s-box substitution
C)p-box permutation
D)expansion permutation
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
In AES in which Round Subkeys are Generated from Original key for each round?
A)key expansion
B)initial round
C)finale round
D)none of these
A)key expansion
B)initial round
C)finale round
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
AES stands for?
A)authorized encryption standard
B)advance encryption standard
C)advance encryption strategy
D)none of these
A)authorized encryption standard
B)advance encryption standard
C)advance encryption strategy
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
Which of them is type of Cipher?
A)stream cipher
B)block cipher
C)both of them
D)none of these
A)stream cipher
B)block cipher
C)both of them
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
The message which is not understandable is called as?
A)cipher text
B)plain text
C)hidden text
D)both a & c
A)cipher text
B)plain text
C)hidden text
D)both a & c
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
The__is a polygraphic substitution cipher based on linear algebra.
A)hill cipher
B)playfair cipher
C)affine cipher
D)none of these
A)hill cipher
B)playfair cipher
C)affine cipher
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
__is the practice of concealing a message within another message,image or file.
A)steganography
B)cryptography
C)cipher
D)receiver
A)steganography
B)cryptography
C)cipher
D)receiver
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
In asymmetric key cryptography, the private key is kept by __________
A)sender
B)receiver
C)sender and receiver
D)none of these
A)sender
B)receiver
C)sender and receiver
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
In cryptography the original message before being transform is called
A)simple text
B)plain text
C)empty text
D)filled text
A)simple text
B)plain text
C)empty text
D)filled text
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
An asymmetric-key (or public-key) cipher uses
A)1 key
B)2 key
C)3 key
D)4 key
A)1 key
B)2 key
C)3 key
D)4 key
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is
A)short
B)flat
C)long
D)thin
A)short
B)flat
C)long
D)thin
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to
A)other
B)data
C)keys
D)each other
A)other
B)data
C)keys
D)each other
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck