D334 Introduction to Cryptography - Set 5 - Part 1
Test your knowledge of technical writing concepts with these practice questions. Each question includes detailed explanations to help you understand the correct answers.
Question 1: Which of the following block cipher modes is the least secure because it encrypts identical blocks of plaintext into identical blocks of ciphertext?
Question 2: Which of the following types of cryptographic attacks aims to recover plaintext from ciphertext without knowledge of the encryption key?
Question 3: Which of the following cryptographic algorithms is commonly used for encrypting files with full disk encryption?
Question 4: Which of the following algorithms is based on the difficulty of solving discrete logarithms?
Question 5: Which type of cipher involves rearranging the characters of the plaintext without changing the actual characters?
Question 6: Which of the following encryption methods allows two parties to establish a shared secret over an insecure channel?
Question 7: Which of the following best describes an active attack in cryptography?
Question 8: What is the key length for AES-192 encryption?
Question 9: Which of the following encryption algorithms is typically used for secure key exchange in public key infrastructure (PKI)?
Question 10: Which of the following is a cryptographic technique used to ensure that data has not been altered?
Question 11: Which cryptographic attack involves attempting every possible key until the correct one is found?
Question 12: Which of the following describes an asymmetric encryption algorithm?
Question 13: What is the primary advantage of using elliptic curve cryptography (ECC) over RSA?
Question 14: Which of the following block cipher modes uses an initialization vector (IV) and chains each block to the previous one?
Question 15: Which of the following is a characteristic of a cryptographic hash function?
Question 16: Which of the following encryption modes allows for parallel processing of blocks?
Question 17: What is the main weakness of the DES encryption algorithm?
Question 18: Which of the following cryptographic attacks involves intercepting communications between two parties and altering the data without their knowledge?
Question 19: Which of the following describes the concept of perfect forward secrecy?
Question 20: Which of the following best describes the function of a digital signature?
Need Guaranteed Results?
Our exam support service guarantees you'll pass your OA on the first attempt. Pay only after you pass!
Get Exam Support