With a rotation of 4, what does erwaiv decrypt to?
CEH Study Guide - 13 Cryptography

Quiz
•
Computers
•
Professional Development
•
Hard

Alejandro Hidalgo
Used 9+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
waive
wave
answer
decrypt
Answer explanation
This is a rotation cipher with a key of 4. When you rotate the alphabet by 4, you end up
with e = a, r = n, w = s, and so on. In addition to not being the right decryption, none of the
others have the correct number of letters. In a substitution cipher like a rotation cipher, you
will always have the same number of letters in the output as you do in the input
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do you call a message before it is encrypted?
Text
Plain text
Bare words
Bare text
Answer explanation
In cryptography, any data or message that is in an unencrypted state is called plaintext.
The output from a cryptographic process is ciphertext. While you may have text as input
to an encryption process, the word text would be ambiguous in this context. The other two
are unrelated to cryptography.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does PGP use to verify identity?
Central authority
Web of users
Web of trust
Central trust authority
Answer explanation
Where certificate authorities use a centralized mechanism for verification of users or
certificate subjects, PGP uses a decentralized model. PGP calls this a web of trust, where
individual users sign keys that belong to other people to validate that they are who they say
they are. All of the other answers are made-up terms.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What principle is used to demonstrate that a signed message came from the owner of the key that signed it?
Non-repudiation
Non-verifiability
Integrity
Authority
Answer explanation
Integrity is part of the CIA triad but isn’t the principle that ties a signed message back
to the subject of the signing certificate. Non-verifiability is nonsense, and authority isn’t
relevant here. Instead, non-repudiation means someone can’t say they didn’t send a message
if it was signed with their key. This assumes the key was in their possession and password
protected, meaning no one else could use it.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Diffie-Hellman used for?
Key management
Key isolation
Key exchange
Key revocation
Answer explanation
Certificates can be revoked but that’s not what Diffie-Hellman is used for. Key
management is a much broader topic than key exchange, which is what Diffie-Hellman is
used for. It is a process that allows two parties to an encrypted conversation to mutually
derive the same key starting with the same base value.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How did 3DES improve on DES?
Made the key longer
Used two keys
Changed algorithms
Used three keys
Answer explanation
3DES, or Triple DES, uses three keys. The first key is used to encrypt the plaintext. The
second key is used to decrypt the ciphertext resulting from the first round of encryption.
Finally, the third key is used to encrypt the ciphertext that resulted from the decryption
with the second key. The key wasn’t made longer because the 168 bits used in 3DES aren’t
used in a single key. The underlying DES algorithm is still used.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What improvement does elliptic curve cryptography make?
Smaller keys improve speed
Algorithm is more complex
Doesn't use factoring, which is better
Longer keys
Answer explanation
Algorithms used for elliptic curve cryptography are not more complex, necessarily.
While they don’t use factoring, that fact alone doesn’t necessarily make the algorithms
better. Instead, elliptic curve cryptography relies on the assumption that determining a
discrete logarithm of a point on an elliptic curve can’t be computed in a consistent way. The
keys that result from elliptic key cryptography are actually smaller than those that result
from factoring with large prime numbers
Create a free account and access millions of resources
Similar Resources on Quizizz
10 questions
SLOT 1: Foundation 1

Quiz
•
Professional Development
10 questions
Cybersecurity Cryptology Chapter 4

Quiz
•
Professional Development
20 questions
MS Excel Basics

Quiz
•
5th Grade - Professio...
20 questions
KEYBOARDING QUIZ

Quiz
•
Professional Development
16 questions
Keyboard Types

Quiz
•
Professional Development
10 questions
How are you doing?

Quiz
•
Professional Development
10 questions
Exploring Network and Application Security

Quiz
•
Professional Development
19 questions
AI and Cyber Security

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade