D334 Introduction to Cryptography - Set 2 - Part 1
Test your knowledge of technical writing concepts with these practice questions. Each question includes detailed explanations to help you understand the correct answers.
Question 1: Which cryptographic method is based on the difficulty of factoring large prime numbers?
Question 2: Which cipher uses a 5x5 matrix to encrypt and decrypt messages?
Question 3: What is a primary characteristic of a stream cipher?
Question 4: Which of the following block cipher modes is the most vulnerable to attacks due to the lack of initialization vectors?
Question 5: Which encryption method is used in WPA2 to secure Wi-Fi networks?
Question 6: Which of the following describes a brute-force attack?
Question 7: Which cryptographic technique allows mathematical operations to be performed on encrypted data without decrypting it first?
Question 8: Which of the following hash algorithms produces a 160-bit output?
Question 9: What is the primary advantage of Elliptic Curve Cryptography (ECC) over RSA?
Question 10: Which cipher is known for shifting each letter in the plaintext by a fixed number of positions in the alphabet?
Question 11: Which of the following is an example of a block cipher?
Question 12: Which of the following encryption modes is best suited for high-performance parallel processing of encrypted blocks?
Question 13: Which of the following is a public key encryption algorithm?
Question 14: Which of the following encryption techniques uses the same key for both encryption and decryption?
Question 15: What is the main vulnerability of using ECB mode for block encryption?
Question 16: What is the primary function of a Certificate Authority (CA) in public key infrastructure?
Question 17: Which type of cryptographic attack involves capturing and reusing a valid transmission at a later time?
Question 18: Which of the following describes the use of a one-time pad in encryption?
Question 19: Which type of encryption algorithm is based on the difficulty of solving discrete logarithms?
Question 20: Which hashing method produces a 256-bit output?
Need Guaranteed Results?
Our exam support service guarantees you'll pass your OA on the first attempt. Pay only after you pass!
Get Exam Support