
IAS CH6 QUIZ
Authored by Darwin Vargas
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Once the plaintext is converted to ciphertext using the encryption algorithm the plaintext is then used as input and the algorithm is applied again
T
F
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A mode of operation is a technique for enhancing the effect of a cryptographic algorithm or adapting the algorithm for an application.
T
F
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The XTS-AES standard describes a method of decryption for data stored in sector-based devices where the threat model includes possible access to stored data by the adversary.
T
F
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
S-AES is the most widely used multiple encryption scheme.
T
F
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Given the potential vulnerability of DES to a brute-force attack, an alternative has been found.
T
F
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
There are no practical cryptanalytic attacks on 3DES.
T
F
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A number of Internet based applications have adopted two-key
3DES, including PGP and S/MIME.
T
F
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?