Deck 8: Encryption

Full screen (f)
exit full mode
Question
The most widely used symmetric key algorithm is Advanced Encryption Standard.
Use Space or
up arrow
down arrow
to flip the card.
Question
Public key encryption is fast becoming the most widely used type of encryption because there are no issues to deal with concerning distribution of keys.
Question
Which of the following is an operation used on binary numbers not found in normal math?

A)AND
B)PLUS
C)MINUS
D)None of the above
Question
A(n)________ refers to the bits that are combined with the plain text to encrypt it.

A)Key
B)Plain
C)Cipher text
D)Algorithm
Question
A digital signature is used to guarantee who sent a message.This is referred to as non-repudiation.
Question
______________ is the process to scramble a message or other information so that it cannot be easily read.

A)Encryption
B)Cryptography
C)Keying
D)Decryption
Question
Which of these is NOT one of the two basic types of cryptography?

A)Asymmetric
B)Symmetric
C)Forward
D)None of the above
Question
________ refers to unencrypted text.

A)Key
B)Plain text
C)Algorithm
D)Cipher text
Question
A virtual private network is a way to use the Internet to create a connection between a remote user and a central location.
Question
Using the __________ cipher you choose some number by which to shift each letter of a text.

A)DC4
B)Caesar
C)Multi-alphabet substitution
D)ASCII
Question
__________ is the art to write in or decipher secret code.

A)Encryption
B)Cryptography
C)Keying
D)Decryption
Question
With asymmetric cryptography a different ______ is used to encrypt the message and to decrypt the message.

A)Code
B)Key
C)Lock
D)Script
Question
Kerberos is an authentication protocol that uses a ticket granting system that sends an encrypted ticket to the user's machine.
Question
Binary numbers are made up of 0s and 1s.
Question
L2TP uses IPsec for its encryption.
Question
PGP involves only private key encryption.
Question
__________refers to encrypted text.

A)Key
B)Plain text
C)Algorithm
D)Cipher text
Question
Using the _________ cipher you select multiple numbers by which to shift letters.

A)DC4
B)Caesar
C)Multi-alphabet substitution
D)ASCII
Question
Cipher text is encrypted text.
Question
IPsec can only encrypt the packet data but not the header information.
Question
With ______________ encryption,one key is used to encrypt a message,and another is used to decrypt the message.

A)Private key
B)Public key
C)Cipher
D)None of the above
Question
A(n)___________is a mathematical process for doing something.

A)Formula
B)Algorithm
C)Cipher
D)None of the above
Question
Windows stores passwords using a method called __________.

A)Hashing
B)Authentication
C)Kerberos
D)None of the above
Question
_________ is a block cipher that uses a variable-length key ranging from 32 to 448 bits.

A)3DES
B)AES
C)Blowfish
D)RC4
Question
Which of these is NOT a type of symmetric algorithm?

A)Stream
B)Block
C)Transcription
D)None of the above
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Encryption
1
The most widely used symmetric key algorithm is Advanced Encryption Standard.
True
2
Public key encryption is fast becoming the most widely used type of encryption because there are no issues to deal with concerning distribution of keys.
True
3
Which of the following is an operation used on binary numbers not found in normal math?

A)AND
B)PLUS
C)MINUS
D)None of the above
A
4
A(n)________ refers to the bits that are combined with the plain text to encrypt it.

A)Key
B)Plain
C)Cipher text
D)Algorithm
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
A digital signature is used to guarantee who sent a message.This is referred to as non-repudiation.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
______________ is the process to scramble a message or other information so that it cannot be easily read.

A)Encryption
B)Cryptography
C)Keying
D)Decryption
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
Which of these is NOT one of the two basic types of cryptography?

A)Asymmetric
B)Symmetric
C)Forward
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
________ refers to unencrypted text.

A)Key
B)Plain text
C)Algorithm
D)Cipher text
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
A virtual private network is a way to use the Internet to create a connection between a remote user and a central location.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
Using the __________ cipher you choose some number by which to shift each letter of a text.

A)DC4
B)Caesar
C)Multi-alphabet substitution
D)ASCII
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
__________ is the art to write in or decipher secret code.

A)Encryption
B)Cryptography
C)Keying
D)Decryption
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
With asymmetric cryptography a different ______ is used to encrypt the message and to decrypt the message.

A)Code
B)Key
C)Lock
D)Script
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
Kerberos is an authentication protocol that uses a ticket granting system that sends an encrypted ticket to the user's machine.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
Binary numbers are made up of 0s and 1s.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
L2TP uses IPsec for its encryption.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
PGP involves only private key encryption.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
__________refers to encrypted text.

A)Key
B)Plain text
C)Algorithm
D)Cipher text
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
Using the _________ cipher you select multiple numbers by which to shift letters.

A)DC4
B)Caesar
C)Multi-alphabet substitution
D)ASCII
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
Cipher text is encrypted text.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
IPsec can only encrypt the packet data but not the header information.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
With ______________ encryption,one key is used to encrypt a message,and another is used to decrypt the message.

A)Private key
B)Public key
C)Cipher
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
A(n)___________is a mathematical process for doing something.

A)Formula
B)Algorithm
C)Cipher
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
Windows stores passwords using a method called __________.

A)Hashing
B)Authentication
C)Kerberos
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
_________ is a block cipher that uses a variable-length key ranging from 32 to 448 bits.

A)3DES
B)AES
C)Blowfish
D)RC4
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
Which of these is NOT a type of symmetric algorithm?

A)Stream
B)Block
C)Transcription
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.