
CEH Study Guide - 13 Cryptography
Authored by Alejandro Hidalgo
Computers
Professional Development
Used 14+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
With a rotation of 4, what does erwaiv decrypt to?
waive
wave
answer
decrypt
Answer explanation
This is a rotation cipher with a key of 4. When you rotate the alphabet by 4, you end up
with e = a, r = n, w = s, and so on. In addition to not being the right decryption, none of the
others have the correct number of letters. In a substitution cipher like a rotation cipher, you
will always have the same number of letters in the output as you do in the input
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do you call a message before it is encrypted?
Text
Plain text
Bare words
Bare text
Answer explanation
In cryptography, any data or message that is in an unencrypted state is called plaintext.
The output from a cryptographic process is ciphertext. While you may have text as input
to an encryption process, the word text would be ambiguous in this context. The other two
are unrelated to cryptography.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does PGP use to verify identity?
Central authority
Web of users
Web of trust
Central trust authority
Answer explanation
Where certificate authorities use a centralized mechanism for verification of users or
certificate subjects, PGP uses a decentralized model. PGP calls this a web of trust, where
individual users sign keys that belong to other people to validate that they are who they say
they are. All of the other answers are made-up terms.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What principle is used to demonstrate that a signed message came from the owner of the key that signed it?
Non-repudiation
Non-verifiability
Integrity
Authority
Answer explanation
Integrity is part of the CIA triad but isn’t the principle that ties a signed message back
to the subject of the signing certificate. Non-verifiability is nonsense, and authority isn’t
relevant here. Instead, non-repudiation means someone can’t say they didn’t send a message
if it was signed with their key. This assumes the key was in their possession and password
protected, meaning no one else could use it.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Diffie-Hellman used for?
Key management
Key isolation
Key exchange
Key revocation
Answer explanation
Certificates can be revoked but that’s not what Diffie-Hellman is used for. Key
management is a much broader topic than key exchange, which is what Diffie-Hellman is
used for. It is a process that allows two parties to an encrypted conversation to mutually
derive the same key starting with the same base value.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How did 3DES improve on DES?
Made the key longer
Used two keys
Changed algorithms
Used three keys
Answer explanation
3DES, or Triple DES, uses three keys. The first key is used to encrypt the plaintext. The
second key is used to decrypt the ciphertext resulting from the first round of encryption.
Finally, the third key is used to encrypt the ciphertext that resulted from the decryption
with the second key. The key wasn’t made longer because the 168 bits used in 3DES aren’t
used in a single key. The underlying DES algorithm is still used.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What improvement does elliptic curve cryptography make?
Smaller keys improve speed
Algorithm is more complex
Doesn't use factoring, which is better
Longer keys
Answer explanation
Algorithms used for elliptic curve cryptography are not more complex, necessarily.
While they don’t use factoring, that fact alone doesn’t necessarily make the algorithms
better. Instead, elliptic curve cryptography relies on the assumption that determining a
discrete logarithm of a point on an elliptic curve can’t be computed in a consistent way. The
keys that result from elliptic key cryptography are actually smaller than those that result
from factoring with large prime numbers
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
China: Communism
Quiz
•
Professional Development
10 questions
Y9 App Lab Assessment
Quiz
•
Professional Development
17 questions
PHP MySQL
Quiz
•
7th Grade - Professio...
15 questions
Computer basics for beginners
Quiz
•
Professional Development
10 questions
Perform Word Processing
Quiz
•
Professional Development
10 questions
AI Project Cycle
Quiz
•
KG - Professional Dev...
10 questions
Google Cloud Digital Leader - Application
Quiz
•
Professional Development
10 questions
Corel Draw
Quiz
•
Professional Development
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
44 questions
Would you rather...
Quiz
•
Professional Development
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
12 questions
Mardi Gras Trivia
Quiz
•
Professional Development
14 questions
Valentine's Day Trivia!
Quiz
•
Professional Development
7 questions
Copy of G5_U5_L14_22-23
Lesson
•
KG - Professional Dev...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
11 questions
NFL Football logos
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development