Practice Quiz – Pelcgbybtl (Cryptology)

21. Plaintext is the original message, while _____ is the encrypted message.

  • ciphertext
  • algorithm
  • digest
  • cipher

22. The specific function of converting plaintext into ciphertext is called a(n) ______.

  • integrity check
  • encryption algorithm
  • permutation
  • data protection standard

23. Studying how often letters and pairs of letters occur in a language is referred to as _______.

  • frequency analysis
  • codebreaking
  • espionage
  • cryptography

24. The practice of hiding messages instead of encoding them is referred to as ______.

  • obfuscation
  • hashing
  • encryption
  • steganography

25. ROT13 and a Caesar cipher are examples of _______.

  • substitution ciphers
  • asymmetric encryption
  • digital signatures
  • steganography

26. DES, RC4, and AES are examples of ______ encryption algorithms.

  • symmetric
  • weak
  • asymmetric
  • strong

27. Which of the following are necessary components for encryption and decryption operations when using an asymmetric encryption system? Check all that apply.

  • Public key
  • Random number generator
  • Digest
  • Private key

28. To create a public key signature, use the ______ key.

  • public
  • private
  • decryption
  • decryption

29. Using an asymmetric cryptosystem provides which of the following benefits? Check all that apply.

  • Non-repudiation
  • Confidentiality
  • Hashing
  • Authenticity

30. If two different files result in the same hash, it is referred to as a ________.

  • key collision
  • hash collision
  • coincidence
  • mistake

Devendra Kumar

Project Management Apprentice at Google

Leave a Reply