Quiz #20: Cryptography

"OK, boys and girls! Do you have your secret decoder handy? Here's this week's special message." (Radio message to subscribed members of the Lone Ranger Club, circa 1943.) Don't need a decoder ring? Take our cryptography quiz to prove it.



How to take the quiz:
- After reading the question, click on the answer that you think is correct to go to the whatis.com definition. If the answer you've chosen is correct, you will see the question text somewhere in the definition.
OR
- After reading the question, write down the letter of your answer choice on scrap paper. Check your answers by using the answer key at the end of the quiz.


1.) This is an encryption/decryption key known only to the party or parties that exchange secret messages.
a) e-signature
b) digital certificate
c) private key
d) security token

2.) This was commonly used in cryptography during World War II.
a) tunneling
b) personalization
c) van Eck phreaking
d) one-time pad

3.) Today, many Internet businesses and users take advantage of cryptography based on this approach.
a) public key infrastructure
b) output feedback
c) Encrypting File System
d) single signon

4.) This is the name for the issuer of a PKI certificate.
a) man in the middle
b) certificate authority
c) Resource Access Control Facility
d) script kiddy

5.) Developed by Philip R. Zimmermann, this is the most widely used privacy-ensuring program by individuals and is also used by many corporations.
a) DSS
b) OCSP
c) Secure HTTP
d) Pretty Good Privacy

6.) This is the encryption algorithm that will begin to supplant the Data Encryption Standard (DES) - and later Triple DES - over the next few years as the new standard encryption algorithm.
a) Rijndael
b) Kerberos
c) Blowfish
d) IPsec

7.) This is the inclusion of a secret message in otherwise unencrypted text or images.
a) masquerade
b) steganography
c) spoof
d) eye-in-hand system

8.) In password protection, this is a random string of data used to modify a password hash.
a) sheepdip
b) salt
c) bypass
d) dongle

9.) This is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value and vice versa.
a) footprinting
b) hash function
c) watermark
d) Electronic Code Book

10.) This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies.
a) chaffing and winnowing
b) cryptanalysis
c) serendipity
d) brute force cracking

SCROLL DOWN FOR ANSWER KEY

Be sure to take:

Quiz #1: Help Desk Basics
Quiz #2: Security Basics
Quiz #3: Data Storage
Quiz #4: Networking Hardware
Quiz #5: Getting Your Message Across the Network
Quiz #6: Servers
Quiz #7: Protocols
Quiz #8: Database Basics
Quiz #9: Wireless
Quiz #10: TCP/IP
Quiz #11: Ego-Booster
Quiz #12: Database II
Quiz #13: AS/400
Quiz #14: Peripherals
Quiz #15: HP
Quiz #16: Web Management Basics
Quiz #17: DSL
Quiz #18: Do you know me? You should!
Quiz #19: Artificial Intelligence
Quiz #20: Cryptography (you're on this quiz now)

ANSWER KEY: 1c - 2d - 3a - 4b - 5d - 6a - 7b - 8b - 9d - 10d

Let us know how you did and suggest a topic for a future quiz! contactus@whatis.com

This was first published in February 2002

Dig deeper on SOA security tools

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchSoftwareQuality

SearchCloudApplications

SearchAWS

TheServerSide

SearchWinDevelopment

Close