D334 Introduction to Cryptography - Set 1 - Part 1

Test your knowledge of technical writing concepts with these practice questions. Each question includes detailed explanations to help you understand the correct answers.

Question 1: Which of the following is an advantage of using a one-time pad in cryptography?

Question 2: What is the primary purpose of a hardware security module (HSM)?

Question 3: Which encryption mode ensures that no two blocks of plaintext will ever produce the same ciphertext?

Question 4: Which type of cryptographic attack involves analyzing the frequency of letters or groups of letters?

Question 5: What is the key weakness of the Electronic Code Book (ECB) encryption mode?

Question 6: Which of the following algorithms is commonly used in light-weight cryptography?

Question 7: Which of the following hashing methods produces a 160-bit output?

Question 8: Which encryption technique is based on the mathematical difficulty of factoring large prime numbers?

Question 9: What is the primary function of a digital certificate?

Question 10: In the Diffie-Hellman key exchange algorithm, what is exchanged between two parties?

Question 11: Which of the following cryptographic operations can be performed without decrypting the data first?

Question 12: Which of the following modes converts a block cipher into a synchronous stream cipher?

Question 13: Which cryptographic hash function is widely considered vulnerable to collision attacks?

Question 14: What is a primary benefit of using elliptic curve cryptography (ECC) over RSA?

Question 15: Which of the following describes a man-in-the-middle (MITM) attack?

Question 16: Which encryption method is most commonly used to encrypt individual files in modern operating systems?

Question 17: In public key cryptography, which key is used to decrypt a message that has been encrypted with the recipient's public key?

Question 18: What is the function of a nonce in cryptographic operations?

Question 19: Which of the following algorithms supports homomorphic encryption?

Question 20: What is the block size used by AES?


Complete the Captcha to view next question set.

Need Guaranteed Results?

Our exam support service guarantees you'll pass your OA on the first attempt. Pay only after you pass!

Get Exam Support