Copyright

Types of Encryption Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. The Blowfish encryption method is _____

Question 2 2. To generate all keys and subkeys, the Blowfish algorithm runs how often?

Question 3 3. In symmetric encryption the key is _____ by sender and receiver

Question 4 4. The encrypted/coded text in an encryption algorithm is called _____

Question 5 5. Data Encryption Standard (DES) operates on _____ bits at a time

Page 2

Question 6 6. The scrambled message in symmetric encryption is called the _____

Question 7 7. PGP encryption _____ the message text

Question 8 8. The _____ is the message that will be encrypted

Question 9 9. A _____ attack tries to figure out the key by trying all possible combinations of values

Question 10 10. E-mail encryption involves _____ a message before sending, and _____ it upon retrieval:

Page 3

Question 11 11. Blowfish makes use of key expansion, which does what?

Question 12 12. Email is a(n) _____ transaction

Question 13 13. The developer of Blowfish _____ hacking attempts

Question 14 14. PGP stands for:

Question 15 15. S/MIME uses a _____ in addition to encryption

Types of Encryption Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Information & Computer Security Training  /  Computer Science Courses
Support