1. Know the terminology flash cards.
2. Know the historical cryptographic systems.
3. Know the popular symmetric, asymmetric, and hashing algorithms.
4. What is the definition of Cryptography?
5. Who is known as the father of Western cryptography?
6. What makes up the CIA Triad?
7. How does the Caesar Cypher work?
8. What is the Scytale cipher?
9. What’s the difference between asymmetric and symmetric algorithms?
10. What was the application of cryptography created by the Egyptians?
11. What is the Vigenere Cypher?
12. What is DES (Data Encryption Standard)?
13. What is the Rijndael Algorithm?
14. What is the relationship between AES an DES in the US?
15. What are Symmetric algorithms are typically known for their ability to maintain?
16. How many and what type of keys involved with Symmetric Algorithms?
17. What’s the advantages of stream ciphers over block ciphers?
18. What ciphers typically use XOR operations?
19. What is an algorithm?
20. What is a certificate authority?
21. What is ciphertext?
22. What are collisions?
23. What is cryptanalysis?
24. What is meant by Decrypt?
25. What is a digital signature?
26. What is meant by Encrypt?
27. What is a Hash Function?
28. What is known as Key clustering?
29. What is a key space?
30. What is non-repudiation?
31. What is plaintext?
32. What is SSL/TLS?
33. What is the work factor?
34. What does the Kerckhoff Principle states?
35. Does it help to know the amount of data that you are encrypting ahead of time using block ciphers?
36. What are one-time pads?
37. What is digital watermarking?
38. What are transposition ciphers?
39. What are Vigenere Ciphers?
40. What is meant by codes?
41. What are polyalphabetic ciphers?
42. What is the process known as steganography?
43. What are running key ciphers?
44. Electronic Code Book works well with block cyphers.
45. Cipher Block Chaining is similar to Electronic Code Book but it uses an IV to add security.
46. Caesar cipher and Vigenere cipher are symmetric algorithms.
47. Block ciphers are not more closely emulate one-time pads.
48. Asymmetric algorithms are sometimes used for digital signature applications.
49. What is Enigma encryption machine?
50. A strength of symmetric algorithms is that they have multiple modes.
51. A strength of asymmetric algorithms when compared to symmetric algorithms is key management. (sharing keys with others while maintaining secrecy)
52. What are the weaknesses of symmetric algorithms?
All the following statement about International Data Encryption Algorithm (IDEA) are True, except:
· Question 2
0 out of 10 points
_______________ take whatever plaintext is put into them and break it into pieces calls block
· Question 3
0 out of 10 points
Triple DES (3DES) triple-encrypts each block with either two independent keys
· Question 4
0 out of 10 points
No matter where encryption is implemented, the process is
· Question 5
0 out of 10 points
PKI provides ___________________ over an insecure medium
Selected Answer:
Penetration test and virus testing medium
· Question 6
0 out of 10 points
Data Encryption Standard (DES) is a 56-bit key algorithm, but the key is too short to be used today
· Question 7
10 out of 10 points
A trusted third-party is:
Selected Answer:
Someone or a computer that you trust
· Question 8
10 out of 10 points
All the following statements are true, except:
Selected Answer:
a.
Blowfish is an algorithm was not designed to be strong, fast, and simple
· Question 9
0 out of 10 points
The entity responsible for accepting information about a party wishing to obtain a certificate is
· Question 10
0 out of 10 points
Some different ways a block cipher can operate are all the following, except:
· Question 11
0 out of 10 points
For Certification Authority, which of the following is True?
· Question 12
0 out of 10 points
All encryption methods (other than hashing) convert plaintext to ciphertext and back via
· Question 13
10 out of 10 points
The following statement are true about Hashing, EXCEPT:
Selected Answer:
None of the above is true, Hashing is not a part of the cryptosystem
· Question 14
10 out of 10 points
Asymmetric is also called
Selected Answer:
c.
Public-key
· Question 15
0 out of 10 points
Digital Certificates provide the following services, ??