Quiz: Cryptography

"OK, boys and girls! Do you have your secret decoder handy? Here's this week's special message." (Radio message to subscribed members of the Lone Ranger Club, circa 1943.)

How to take the quiz:
- After reading the question, click on the answer that you think is correct to go to the whatis.com definition. If the answer you've chosen is correct, you will see the question text (or a paraphrase of it) somewhere in the definition.
- After reading the question, write down the letter of your answer choice on scrap paper. Check your answers by using the answer key at the end of the quiz.

1) This is an encryption/decryption key known only to the party or parties that exchange secret messages.

    Requires Free Membership to View

b) digital certificate
c) private key
d) security token

2) This was commonly used in cryptography during World War II.
a) tunneling
b) personalization
c) van Eck phreaking
d) one-time pad

3) Today, many Internet businesses and users take advantage of cryptography based on this approach.
a) public key infrastructure
b) output feedback
c) Encrypting File System
d) single signon

4) This is the name for the issuer of a PKI certificate.
a) man in the middle
b) certificate authority
c) Resource Access Control Facility
d) script kiddy

5) Developed by Philip R. Zimmermann, this is the most widely used privacy-ensuring program by individuals and is also used by many corporations.
a) DSS
c) Secure HTTP
d) Pretty Good Privacy

6) This is the encryption algorithm that will begin to supplant the Data Encryption Standard (DES) - and later Triple DES - over the next few years as the new standard encryption algorithm.
a) Rijndael
b) Kerberos
c) Blowfish
d) IPsec

7) This is the inclusion of a secret message in otherwise unencrypted text or images.
a) masquerade
b) steganography
c) spoof
d) eye-in-hand system

8) In password protection, this is a random string of data used to modify a password hash.
a) sheepdip
b) salt
c) bypass
d) dongle

9) This is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value and vice versa.
a) footprinting
b) hash function
c) watermark
d) Electronic Code Book

10) This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies.
a) chaffing and winnowing
b) cryptanalysis
c) serendipity
d) brute force cracking

Scroll down for answer key:

Be sure to take:
Quiz #1: Help Desk Basics
Quiz #2: Security Basics
Quiz #3: Data Storage
Quiz #4: Networking Hardware
Quiz #5: Getting Your Message Across the Network
Quiz #6: Servers
Quiz #7: Protocols
Quiz #8: Database Basics
Quiz #9: Wireless
Quiz #10: TCP/IP
Quiz #11: Ego-Booster
Quiz #12: Database II
Quiz # 13: AS/400
Quiz #14: Peripherals
Quiz #15: HP
Quiz #16: Web Management Basics
Quiz #17: DSL
Quiz #18: Do You Know Me? You Should!
Quiz #19: Artificial Intelligence

ANSWERS: 1c;2d;3a;4b;5d;6a;7b;8b;9d;10d

This was first published in April 2002

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.