D334 Introduction to Cryptography - Set 5 - Part 1

Test your knowledge of technical writing concepts with these practice questions. Each question includes detailed explanations to help you understand the correct answers.

Question 1: Which of the following block cipher modes is the least secure because it encrypts identical blocks of plaintext into identical blocks of ciphertext?

Question 2: Which of the following types of cryptographic attacks aims to recover plaintext from ciphertext without knowledge of the encryption key?

Question 3: Which of the following cryptographic algorithms is commonly used for encrypting files with full disk encryption?

Question 4: Which of the following algorithms is based on the difficulty of solving discrete logarithms?

Question 5: Which type of cipher involves rearranging the characters of the plaintext without changing the actual characters?

Question 6: Which of the following encryption methods allows two parties to establish a shared secret over an insecure channel?

Question 7: Which of the following best describes an active attack in cryptography?

Question 8: What is the key length for AES-192 encryption?

Question 9: Which of the following encryption algorithms is typically used for secure key exchange in public key infrastructure (PKI)?

Question 10: Which of the following is a cryptographic technique used to ensure that data has not been altered?

Question 11: Which cryptographic attack involves attempting every possible key until the correct one is found?

Question 12: Which of the following describes an asymmetric encryption algorithm?

Question 13: What is the primary advantage of using elliptic curve cryptography (ECC) over RSA?

Question 14: Which of the following block cipher modes uses an initialization vector (IV) and chains each block to the previous one?

Question 15: Which of the following is a characteristic of a cryptographic hash function?

Question 16: Which of the following encryption modes allows for parallel processing of blocks?

Question 17: What is the main weakness of the DES encryption algorithm?

Question 18: Which of the following cryptographic attacks involves intercepting communications between two parties and altering the data without their knowledge?

Question 19: Which of the following describes the concept of perfect forward secrecy?

Question 20: Which of the following best describes the function of a digital signature?


Complete the Captcha to view next question set.

Need Guaranteed Results?

Our exam support service guarantees you'll pass your OA on the first attempt. Pay only after you pass!

Get Exam Support