You are on page 1of 6

Question 1

5 out of 5 points

An encryption machine used by the Germans during WW2.

Selected Answer:
Correct
Enigma

Answers:
Purple

Correct
Enigma

Ultra

Turing

Question 2
5 out of 5 points

The Advanced Encryption Standard (AES) replaced the Data Encryption Standard (DES)
in the United states.

Selected Answer:
CorrectTrue
Answers:
Correct True
False
Question 3
5 out of 5 points

The _______ encryption algorithm, created by IBM, became the American standard for
encryption in the 1970's.

Selected Answer:
Correct
Data Encryption Standard (DES)

Answers:
Advanced Encryption Standard (AES)

Correct
Data Encryption Standard (DES)

Pretty Good Privacy (PGP)

Purple

Question 4
5 out of 5 points

The __________ polyalphabetic cypher uses 26 alphabets.

Selected Answer:
Correct
Vigenere
Answers:
Alberti

Enigma

Correct
Vigenere

Scytale

Question 5
5 out of 5 points

This ancient application of cryptography, created by the Egyptians more than 4,000
years ago, used pictures to depict words.

Selected Answer:
Correct
Hieroglyphics

Answers:
Navajo

Caesar

Scytale

Correct
Hieroglyphics

Question 6
5 out of 5 points

This is a transposition cipher used by the Greek Spartans.

Selected Answer:
Correct
Scytale

Answers:
Vigenere

Enigma

Correct
Scytale

Casesar

Question 7
5 out of 5 points

Using a Caesar Cypher with an offset of three characters (a -> d, b ->e, ...., z ->
c), what would be the correct cypher text for the plain text "attack at dawn"?

Selected Answer:
Correct
dwwdfn dw gdzq
Answers:
cuuwfe as ijhz

attack at dawn

Correct
dwwdfn dw gdzq

nyythd oj kged

Question 8
5 out of 5 points

Which of the following in not part of the CIA triad that is one of the cornerstones
of information security?

Selected Answer:
Correct
Authentication

Answers:
Confidentiality

Availability

Correct
Authentication

Integrity

Question 9
5 out of 5 points

_______ is known as the father of Western cryptography.

Selected Answer:
Correct
Alberti

Answers:
Correct
Alberti

Alan Turing

Julius Caesar

Vigenere

Question 10
5 out of 5 points

_________ is the science and practice of safeguarding information through codes.

Selected Answer:
Correct
cryptography

Answers:
cryptanalysis

Scientology

Correct
cryptography

Polyalphabetic

Question 11
5 out of 5 points

Certain encryption algorithms are unbreakable.

Selected Answer:
CorrectFalse
Answers:
True
Correct False
Question 12
5 out of 5 points

Asymmetric encryption uses ___ key(s).

Selected Answer:
Correct
2

Answers:
1

Correct
2

Question 13
5 out of 5 points

Encryption does not require computers.

Selected Answer:
CorrectTrue
Answers:
Correct True
False
Question 14
5 out of 5 points

Symmetric encryption uses ____ key(s).

Selected Answer:
Correct
1

Answers:
Correct
1

Question 15
5 out of 5 points

Asymmetric encryption uses (choose all that apply):

Selected Answers:
Correct
Public Keys

Correct
Private Keys

Answers:
Simple Keys

Correct
Public Keys

Auto Keys

Correct
Private Keys

Question 16
5 out of 5 points

With symmetric encryption, you have to share your key.

Selected Answer:
CorrectTrue
Answers:
Correct True
False
Question 17
5 out of 5 points

_________ states that the strength of an encryption algorithm is based on the


secrecy of the key, not the secrecy of the algorithm itself.

Selected Answer:
Correct
Kerchoff's Principle

Answers:
Alberti's Principle

Vigenere's Principle

Correct
Kerchoff's Principle
Caesar's Principle

Question 18
5 out of 5 points

Scytale can be easily deciphered with any diameter rod.

Selected Answer:
CorrectFalse
Answers:
True
Correct False
Question 19
5 out of 5 points

The Caesar Cipher was one of the first implementations of a substitution cipher.

Selected Answer:
CorrectTrue
Answers:
Correct True
False
Question 20
5 out of 5 points

New technology eliminates the need for encryption.

Selected Answer:
CorrectFalse
Answers:
True
Correct False
Tuesday, January 8, 2019 1:39:44 AM EST

You might also like