Quiz: Cryptography

OK, boys and girls! Do you have your secret decoder handy? Here's this week's special message. OK, boys and girls! Do you have your secret decoder handy? Here's this week's special message." (Radio message to subscribed members of the Lone Ranger Club, circa 1943.) How to take the quiz: - After reading the question, click on the answer that you think is correct to go to the whatis.com definition. If the answer you've chosen is correct, you will see the question text (or a paraphrase of it) somewhere in the definition. OR - Check your answers by using the answer key at the end of the quiz. This is an encryption/decryption key known only to the party or parties that exchange secret messages. a) e-signature b) digital certificate c) private key d) security token 2) This was commonly used in cryptography during World War II. a) tunneling b) personalization c) van Eck phreaking d) one-time pad 3) Today, many Internet businesses and users take advantage of cryptography based on this approach. a) public key infrastructure b) output feedback c) Encrypting File System d) single signon 4) This is the name for the issuer of a PKI certificate. a) man in the middle b) certificate authority c) Resource Access Control Facility d) script kiddy 5) Developed by Philip R. Zimmermann, this is the most widely used privacy-ensuring program by individuals and is also used by many corporations. a) DSS b) OCSP c) Secure HTTP d) Pretty Good Privacy 6) This is the encryption algorithm that will begin to supplant the Data Encryption Standard (DES) - and later Triple DES - over the next few years as the new standard encryption algorithm. a) Rijndael b) Kerberos c) Blowfish d) IPsec 7) This is the inclusion of a secret message in otherwise unencrypted text or images. a) masquerade b) steganography c) spoof d) eye-in-hand system 8) In password protection, this is a random string of data used to modify a password hash. a) sheepdip b) salt c) bypass d) dongle 9) This is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value and vice versa. a) footprinting b) hash function c) watermark d) Electronic Code Book 10) This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies. a) chaffing and winnowing b) cryptanalysis c) serendipity d) brute force cracking Click here for answer key or take another quiz!

"OK, boys and girls! Do you have your secret decoder handy? Here's this week's special message." (Radio message to subscribed members of the Lone Ranger Club, circa 1943.)

How to take the quiz:
- After reading the question, click on the answer that you think is correct to go to the whatis.com definition. If the answer you've chosen is correct, you will see the question text (or a paraphrase of it) somewhere in the definition.
OR
- Check your answers by using the answer key at the end of the quiz.

1) This is an encryption/decryption key known only to the party or parties that exchange secret messages.
a) e-signature
b) digital certificate
c) private key
d) security token

2) This was commonly used in cryptography during World War II.
a) tunneling
b) personalization
c) van Eck phreaking
d) one-time pad

3) Today, many Internet businesses and users take advantage of cryptography based on this approach.
a) public key infrastructure
b) output feedback
c) Encrypting File System
d) single signon

4) This is the name for the issuer of a PKI certificate.
a) man in the middle
b) certificate authority
c) Resource Access Control Facility
d) script kiddy

5) Developed by Philip R. Zimmermann, this is the most widely used privacy-ensuring program by individuals and is also used by many corporations.
a) DSS
b) OCSP
c) Secure HTTP
d) Pretty Good Privacy

6) This is the encryption algorithm that will begin to supplant the Data Encryption Standard (DES) - and later Triple DES - over the next few years as the new standard encryption algorithm.
a) Rijndael
b) Kerberos
c) Blowfish
d) IPsec

7) This is the inclusion of a secret message in otherwise unencrypted text or images.
a) masquerade
b) steganography
c) spoof
d) eye-in-hand system

8) In password protection, this is a random string of data used to modify a password hash.
a) sheepdip
b) salt
c) bypass
d) dongle

9) This is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value and vice versa.
a) footprinting
b) hash function
c) watermark
d) Electronic Code Book

10) This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies.
a) chaffing and winnowing
b) cryptanalysis
c) serendipity
d) brute force cracking

Click here for answer key or take another quiz!

This was first published in April 2005

Dig deeper on Disk Encryption and File Encryption

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close