click below
click below
Normal Size Small Size show me how
Crypto Test Review
Question | Answer |
---|---|
What is the word "DOG" encrypted with the Caesar cipher with a key of 5? | ITL |
Which set of letters spells a valid word when decrypted using the Caesar cipher with a key of 2? | the Vigenère Cipher |
Encrypted information is only viewable by authorized users who have the correct key to decrypt. This describes which aspect of the CIA triad? | Confidentiality |
Using the Caesar cipher, “HELLO” is encrypted to “OLSSV” by applying a shift of 7. The message “HELLO” is considered the __________. | plaintext |
Using the Caesar cipher, “HELLO” is encrypted to “OLSSV” by applying a shift of 7. The number 7 is considered the __________. | key |
Roland knew that the code to his sister’s toy safe was only two digits long. He was able to crack the safe open by attempting every two-digit code until he found the correct one. What method of code-breaking did Roland use? | Brute force |
In an attempt to decrypt the passwords, Marsha tallied the number of times each letter appeared. What method of code-breaking did Marsha use? | Letter frequency analysis |
What is the resulting ciphertext when the word DAN is encrypted using the Caeser cipher along with the key of 3? | GDQ |
Which set of letters spells a valid word when decrypted using the Caesar cipher with a key of 2? | TWP |
True or False: Using strong passwords is a way to encrypt your private data? | True |
True or False: Setting up and using 2-factor authentications is a way to encrypt your private data? | true |
True or False: Only clicking on links that are sent through email is a way to encrypt your private data? | false |
True or False: Safe web browsing is a way to encrypt your private data? | true |
True or False: Using the same password for every site or app is a way to encrypt your private data? | false |