D334 Introduction to Cryptography - Set 2 - Part 1

Test your knowledge of technical writing concepts with these practice questions. Each question includes detailed explanations to help you understand the correct answers.

Question 1: Which cryptographic method is based on the difficulty of factoring large prime numbers?

Question 2: Which cipher uses a 5x5 matrix to encrypt and decrypt messages?

Question 3: What is a primary characteristic of a stream cipher?

Question 4: Which of the following block cipher modes is the most vulnerable to attacks due to the lack of initialization vectors?

Question 5: Which encryption method is used in WPA2 to secure Wi-Fi networks?

Question 6: Which of the following describes a brute-force attack?

Question 7: Which cryptographic technique allows mathematical operations to be performed on encrypted data without decrypting it first?

Question 8: Which of the following hash algorithms produces a 160-bit output?

Question 9: What is the primary advantage of Elliptic Curve Cryptography (ECC) over RSA?

Question 10: Which cipher is known for shifting each letter in the plaintext by a fixed number of positions in the alphabet?

Question 11: Which of the following is an example of a block cipher?

Question 12: Which of the following encryption modes is best suited for high-performance parallel processing of encrypted blocks?

Question 13: Which of the following is a public key encryption algorithm?

Question 14: Which of the following encryption techniques uses the same key for both encryption and decryption?

Question 15: What is the main vulnerability of using ECB mode for block encryption?

Question 16: What is the primary function of a Certificate Authority (CA) in public key infrastructure?

Question 17: Which type of cryptographic attack involves capturing and reusing a valid transmission at a later time?

Question 18: Which of the following describes the use of a one-time pad in encryption?

Question 19: Which type of encryption algorithm is based on the difficulty of solving discrete logarithms?

Question 20: Which hashing method produces a 256-bit output?


Complete the Captcha to view next question set.

Need Guaranteed Results?

Our exam support service guarantees you'll pass your OA on the first attempt. Pay only after you pass!

Get Exam Support