21. Plaintext is the original message, while _____ is the encrypted message.
- ciphertext
- algorithm
- digest
- cipher
22. The specific function of converting plaintext into ciphertext is called a(n) ______.
- integrity check
- encryption algorithm
- permutation
- data protection standard
23. Studying how often letters and pairs of letters occur in a language is referred to as _______.
- frequency analysis
- codebreaking
- espionage
- cryptography
24. The practice of hiding messages instead of encoding them is referred to as ______.
- obfuscation
- hashing
- encryption
- steganography
25. ROT13 and a Caesar cipher are examples of _______.
- substitution ciphers
- asymmetric encryption
- digital signatures
- steganography
26. DES, RC4, and AES are examples of ______ encryption algorithms.
- symmetric
- weak
- asymmetric
- strong
27. Which of the following are necessary components for encryption and decryption operations when using an asymmetric encryption system? Check all that apply.
- Public key
- Random number generator
- Digest
- Private key
29. Using an asymmetric cryptosystem provides which of the following benefits? Check all that apply.
- Non-repudiation
- Confidentiality
- Hashing
- Authenticity
30. If two different files result in the same hash, it is referred to as a ________.
- key collision
- hash collision
- coincidence
- mistake