Site MapHelpFeedbackMultiple Choice Quiz
Multiple Choice Quiz
(See related pages)



1

In which of the following steps in a round of AES are the bytes arranged in a rectangle and shifted?
A)Add round key
B)Byte sub
C)Mix column
D)Shift row
2

Which of the following cryptographic algorithms is a block-mode cipher that uses 64-bit blocks and a variable key length from 32 to 448 bits?
A)AES
B)Blowfish
C)CAST
D)IDEA
3

Which of the following encryption algorithms is NOT a block-mode cipher?
A)RC2
B)RC4
C)RC5
D)RC6
4

Which of the following cryptographic algorithms is a symmetric encryption method?
A)CAST
B)Diffie-Hellman
C)ElGamal
D)RSA
5

Which asymmetric encryption algorithm plays a role in the electronic key exchange method of the Secure Sockets Layer protocol?
A)Diffie-Hellman
B)ECC
C)ElGamal
D)RSA
6

Which encryption algorithm spins through the DES algorithm three times via multiple encryption?
A)AES
B)3DES
C)IDEA
D)RC2
7

The ability to maintain secrecy about some piece of data is called ____.
A)authentication
B)confidentiality
C)integrity
D)nonrepudiation
8

Which method of cryptanalysis puts the plaintext through a simplified cipher to deduce the likely key in the full version of the cipher?
A)Asymmetric cryptanalysis
B)Differential cryptanalysis
C)Linear cryptanalysis
D)Symmetric cryptanalysis
9

Which asymmetric encryption algorithm uses the product of two large prime numbers and works on the principle of difficulty in factoring such numbers?
A)Diffie-Hellman
B)ECC
C)ElGamal
D)RSA
10

Which of the following security principles favors symmetric encryption due to its speed and because asymmetric encryption can increase the size of the object being encrypted?
A)Authentication
B)Confidentiality
C)Integrity
D)Nonrepudiation







Security+ and BeyondOnline Learning Center

Home > Chapter 5 > Multiple Choice Quiz