Professional Documents
Culture Documents
5 out of 5 points
Selected Answer:
Correct
Enigma
Answers:
Purple
Correct
Enigma
Ultra
Turing
Question 2
5 out of 5 points
The Advanced Encryption Standard (AES) replaced the Data Encryption Standard (DES)
in the United states.
Selected Answer:
CorrectTrue
Answers:
Correct True
False
Question 3
5 out of 5 points
The _______ encryption algorithm, created by IBM, became the American standard for
encryption in the 1970's.
Selected Answer:
Correct
Data Encryption Standard (DES)
Answers:
Advanced Encryption Standard (AES)
Correct
Data Encryption Standard (DES)
Purple
Question 4
5 out of 5 points
Selected Answer:
Correct
Vigenere
Answers:
Alberti
Enigma
Correct
Vigenere
Scytale
Question 5
5 out of 5 points
This ancient application of cryptography, created by the Egyptians more than 4,000
years ago, used pictures to depict words.
Selected Answer:
Correct
Hieroglyphics
Answers:
Navajo
Caesar
Scytale
Correct
Hieroglyphics
Question 6
5 out of 5 points
Selected Answer:
Correct
Scytale
Answers:
Vigenere
Enigma
Correct
Scytale
Casesar
Question 7
5 out of 5 points
Using a Caesar Cypher with an offset of three characters (a -> d, b ->e, ...., z ->
c), what would be the correct cypher text for the plain text "attack at dawn"?
Selected Answer:
Correct
dwwdfn dw gdzq
Answers:
cuuwfe as ijhz
attack at dawn
Correct
dwwdfn dw gdzq
nyythd oj kged
Question 8
5 out of 5 points
Which of the following in not part of the CIA triad that is one of the cornerstones
of information security?
Selected Answer:
Correct
Authentication
Answers:
Confidentiality
Availability
Correct
Authentication
Integrity
Question 9
5 out of 5 points
Selected Answer:
Correct
Alberti
Answers:
Correct
Alberti
Alan Turing
Julius Caesar
Vigenere
Question 10
5 out of 5 points
Selected Answer:
Correct
cryptography
Answers:
cryptanalysis
Scientology
Correct
cryptography
Polyalphabetic
Question 11
5 out of 5 points
Selected Answer:
CorrectFalse
Answers:
True
Correct False
Question 12
5 out of 5 points
Selected Answer:
Correct
2
Answers:
1
Correct
2
Question 13
5 out of 5 points
Selected Answer:
CorrectTrue
Answers:
Correct True
False
Question 14
5 out of 5 points
Selected Answer:
Correct
1
Answers:
Correct
1
Question 15
5 out of 5 points
Selected Answers:
Correct
Public Keys
Correct
Private Keys
Answers:
Simple Keys
Correct
Public Keys
Auto Keys
Correct
Private Keys
Question 16
5 out of 5 points
Selected Answer:
CorrectTrue
Answers:
Correct True
False
Question 17
5 out of 5 points
Selected Answer:
Correct
Kerchoff's Principle
Answers:
Alberti's Principle
Vigenere's Principle
Correct
Kerchoff's Principle
Caesar's Principle
Question 18
5 out of 5 points
Selected Answer:
CorrectFalse
Answers:
True
Correct False
Question 19
5 out of 5 points
The Caesar Cipher was one of the first implementations of a substitution cipher.
Selected Answer:
CorrectTrue
Answers:
Correct True
False
Question 20
5 out of 5 points
Selected Answer:
CorrectFalse
Answers:
True
Correct False
Tuesday, January 8, 2019 1:39:44 AM EST