Copyright

Cryptography in Cybersecurity Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. The acronym AES stands for?

Question 2 2. AES is strong because?

Question 3 3. The U.S. Government adopted AES as a standard in what year?

Question 4 4. AES uses a blocking size of?

Question 5 5. Modern encryption is classified as _____ or _____.

Page 2

Question 6 6. Most web browsers have a little _____ icon that lets you know that your transactions are secured and that the communication are encrypted.

Question 7 7. Encryption is based on _____.

Question 8 8. The roots of modern encryption can be traced back almost _____ years.

Question 9 9. What is cipher or encrypted text?

Question 10 10. What bad can happen if key management is not properly practiced?

Page 3

Question 11 11. What is a symmetric encryption?

Question 12 12. What kind of keys are there in an asymmetric encryption?

Question 13 13. Which of the following terms refers to the act of making data unreadable to everyone besides those for whom the data is intended?

Question 14 14. Which of the following best defines what a cipher is?

Question 15 15. Which of the following best defines cryptanalysis?

Page 4

Question 16 16. Which of the following is one way forensic investigators use cryptography?

Question 17 17. An encryption key is similar to a:

Question 18 18. The Data Encryption Standard:

Question 19 19. Encryption is required:

Question 20 20. A benefit of symmetric encryption is:

Page 5

Question 21 21. Symmetric encryption uses:

Question 22 22. Encryption is the process of:

Question 23 23. Encryption strength is a measure of:

Question 24 24. A key is:

Question 25 25. One of the main points of vulnerability of a system is that data in _____ is not encrypted.

Page 6

Question 26 26. Secure user authentication in cryptography is achieved by _____.

Question 27 27. What is cryptography?

Question 28 28. Cryptography is used to conceal data in transmission by the use of _____.

Question 29 29. The National Institute of Standards and Technology (NIST) released AES in what year?

Question 30 30.

The following is an example of encrypting data using _____.

Plain TextABCDEFGHIJKLMNOPQRSTUVWXYZ
Encrypted Text EFGHIAKXJNOPQRSLUVWTYZMBCD

Cryptography in Cybersecurity Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Computer Science 110: Introduction to Cybersecurity  /  Computer Science Courses
Support