"OK, boys and girls! Do you have your secret decoder handy? Here's this week's special message." (Radio message to subscribed members of the Lone Ranger Club, circa 1943.)
Content Continues Below
How to take the quiz:
- After reading the question, click on the answer that you think is correct to go to the whatis.com definition. If the answer you've chosen is correct, you will see the question text (or a paraphrase of it) somewhere in the definition.
- Check your answers by using the answer key at the end of the quiz.
1) This is an encryption/decryption key known only to the party or parties that exchange secret messages.
b) digital certificate
c) private key
d) security token
2) This was commonly used in cryptography during World War II.
c) van Eck phreaking
d) one-time pad
3) Today, many Internet businesses and users take advantage of cryptography based on this approach.
a) public key infrastructure
b) output feedback
c) Encrypting File System
d) single signon
4) This is the name for the issuer of a PKI certificate.
a) man in the middle
b) certificate authority
c) Resource Access Control Facility
d) script kiddy
5) Developed by Philip R. Zimmermann, this is the most widely used privacy-ensuring program by individuals and is also used by many corporations.
c) Secure HTTP
d) Pretty Good Privacy
6) This is the encryption algorithm that will begin to supplant the Data Encryption Standard (DES) - and later Triple DES - over the next few years as the new standard encryption algorithm.
7) This is the inclusion of a secret message in otherwise unencrypted text or images.
d) eye-in-hand system
8) In password protection, this is a random string of data used to modify a password hash.
9) This is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value and vice versa.
b) hash function
d) Electronic Code Book
10) This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies.
a) chaffing and winnowing
d) brute force cracking
Click here for answer key or take another quiz!
This was last updated in April 2005
Dig Deeper on Disk and file encryption tools