MIS 399 – Chapter 5 Quiz

  1. __________ is a principle that affects the randomness of an output.  Confusion
  2. __________ is a research field that involves the study of cryptosystems that are not vulnerable to quantum computation.  Post-quantum cryptography
  3. __________ is the most widely used stream cipher and is used in popular protocols such as Transport Layer Security (TLS) and WEP/WPA/WPA2.  RC4
  4. A __________ is a special piece of data used in both the encryption and decryption processes.  Key
  5. Asymmetric encryption tends to be faster, is less computationally involved, and is better for bulk transfers.  False
  6. Common uses of hashing algorithms are to store computer passwords and to ensure message __________.  Integrity
  7. Hashing functions are special mathematical functions that perform a two-way encryption.  False
  8. Keyspace refers to __________.  a set of possible key values
  9. Once a hash value is generated, it is not reversible.  True
  10. The consequence of a hash function that suffers from collisions is a loss of __________.  Integrity
  11. The ECB mode of operation is recommended for use in all cryptographic protocols because it provides protection against input patterns or known blocks.   False
  12. The Vigenere cipher works as a(n) __________ cipher that depends on a password.   polyalphabetic substitution
  13. What is the newest version of the Secure Hash Algorithm (SHA)? SHA-3
  14. When an algorithm lists a certain number of bits as a key, it is defining the keyspace.  True
  15. Which encryption algorithm is one of the more popular symmetric algorithms in use today?  3DES
  16. Which encryption method is based on the idea of two keys, one that is public and one that is private?  Asymmetric encryption
  17. Which encryption method is based on the idea of using the same key for encryption and decryption of data?  Symmetric encryption
  18. Which encryption protocol is the gold standard for key exchange?  Diffie-Hellman (DH)
  19. Which mode of operation is defined as a block mode where each block is XORed with the previous ciphertext block before being encrypted?  Cipher Block Chaining (CBC)
  20. Which term refers to the science of encrypting, or hiding, information?   Cryptography

Other Links:

Statistics Quiz

Networking Quiz

See other websites for quiz:

Check on QUIZLET

Check on CHEGG

Leave a Reply

Your email address will not be published. Required fields are marked *