Deck 21: Cryptography and Security

ملء الشاشة (f)
exit full mode
سؤال
The power of a particular encryption technique is based on the ____.

A) key length
B) encryption strength
C) storage technique
D) system entropy
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A ____ is visible or invisible information added to an image, video, or audio that identifies the copyright owner of the media.

A) digital signature
B) digital footprint
C) digital fingerprint
D) digital watermark
سؤال
The hash value is called a ____.

A) cipher
B) digest
C) ciphertext
D) plaintext
سؤال
In ____ encryption, the private key is kept private, in the hands of a single individual.

A) asymmetric
B) symmetric
C) private key
D) shared secret
سؤال
____ ciphers encrypt any number of bits

A) Bit
B) Hash
C) Stream
D) Block
سؤال
Asymmetric encryption algorithms use ____________________ keys to perform the encryption and decryption.
سؤال
The ____ determines the level of data protection provided by the encryption technique.

A) encryption strength
B) storage technique
C) system entropy
D) key length
سؤال
Symmetric encryption is generally thought to be more secure than asymmetric encryption.
سؤال
Keeping secrets has become a major force in networking and communication.
سؤال
Symmetric encryption algorithms use one key for both encryption and decryption.
سؤال
Hashed data can be unhashed and turned back into their original form.
سؤال
In ____ encryption, the single key must be shared between the individuals wishing to protect their data.

A) asymmetric
B) public key
C) symmetric
D) shareable
سؤال
____________________ is a technique to detect changes to information rather than encrypt and decrypt information.
سؤال
____ is a fascinating and possibly dangerous technique for hiding one form of information inside another.

A) Sociology
B) Cryptography
C) Steganography
D) Social analytics
سؤال
The ____________________ of the WAV file determines how much data can be hidden inside it.
سؤال
A JPG image is a complex data structure containing compressed DCT coefficients for ____ blocks of pixels.

A) 4x4
B) 8x8
C) 16x16
D) 32x32
سؤال
In the ____ cipher technique, the letters of the alphabet are shifted one or more positions to obtain the encryption alphabet.

A) Caesar
B) Roman
C) Augustus
D) Romani
سؤال
A(n) ____________________ is a special word, phrase, or binary number that is used during encryption or decryption to manipulate the data.
سؤال
Even the best encryption algorithm can be outdone by improper use.
سؤال
A(n) ____________________ cipher is an algorithm that encrypts or decrypts blocks of data, such as 64-bit or 128-bit chunks of information at a time.
سؤال
How is data hidden inside a WAV?
سؤال
Match between columns
Involves taking encrypted information and putting it back into the original form
Cryptography
Involves taking encrypted information and putting it back into the original form
Encryption
Involves taking encrypted information and putting it back into the original form
Decryption
Involves taking encrypted information and putting it back into the original form
Symmetric encryption
Involves taking encrypted information and putting it back into the original form
Asymmetric encryption
Two keys are used to encrypt and decrypt the data
Cryptography
Two keys are used to encrypt and decrypt the data
Encryption
Two keys are used to encrypt and decrypt the data
Decryption
Two keys are used to encrypt and decrypt the data
Symmetric encryption
Two keys are used to encrypt and decrypt the data
Asymmetric encryption
A single key is used to encrypt and decrypt the data
Cryptography
A single key is used to encrypt and decrypt the data
Encryption
A single key is used to encrypt and decrypt the data
Decryption
A single key is used to encrypt and decrypt the data
Symmetric encryption
A single key is used to encrypt and decrypt the data
Asymmetric encryption
The process to change something easy to read into something that is difficult to read
Cryptography
The process to change something easy to read into something that is difficult to read
Encryption
The process to change something easy to read into something that is difficult to read
Decryption
The process to change something easy to read into something that is difficult to read
Symmetric encryption
The process to change something easy to read into something that is difficult to read
Asymmetric encryption
Involves taking data and coding it into a different, unreadable form
Cryptography
Involves taking data and coding it into a different, unreadable form
Encryption
Involves taking data and coding it into a different, unreadable form
Decryption
Involves taking data and coding it into a different, unreadable form
Symmetric encryption
Involves taking data and coding it into a different, unreadable form
Asymmetric encryption
سؤال
What is a frequency analysis?
سؤال
Describe asymmetric encryption.
سؤال
Describe symmetric encryption.
سؤال
Discuss the encryption strength of symmetric and asymmetric encryption.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/26
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 21: Cryptography and Security
1
The power of a particular encryption technique is based on the ____.

A) key length
B) encryption strength
C) storage technique
D) system entropy
B
2
A ____ is visible or invisible information added to an image, video, or audio that identifies the copyright owner of the media.

A) digital signature
B) digital footprint
C) digital fingerprint
D) digital watermark
D
3
The hash value is called a ____.

A) cipher
B) digest
C) ciphertext
D) plaintext
B
4
In ____ encryption, the private key is kept private, in the hands of a single individual.

A) asymmetric
B) symmetric
C) private key
D) shared secret
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
5
____ ciphers encrypt any number of bits

A) Bit
B) Hash
C) Stream
D) Block
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
6
Asymmetric encryption algorithms use ____________________ keys to perform the encryption and decryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
7
The ____ determines the level of data protection provided by the encryption technique.

A) encryption strength
B) storage technique
C) system entropy
D) key length
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
8
Symmetric encryption is generally thought to be more secure than asymmetric encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
9
Keeping secrets has become a major force in networking and communication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
10
Symmetric encryption algorithms use one key for both encryption and decryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
11
Hashed data can be unhashed and turned back into their original form.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
12
In ____ encryption, the single key must be shared between the individuals wishing to protect their data.

A) asymmetric
B) public key
C) symmetric
D) shareable
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
13
____________________ is a technique to detect changes to information rather than encrypt and decrypt information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
14
____ is a fascinating and possibly dangerous technique for hiding one form of information inside another.

A) Sociology
B) Cryptography
C) Steganography
D) Social analytics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
15
The ____________________ of the WAV file determines how much data can be hidden inside it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
16
A JPG image is a complex data structure containing compressed DCT coefficients for ____ blocks of pixels.

A) 4x4
B) 8x8
C) 16x16
D) 32x32
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
17
In the ____ cipher technique, the letters of the alphabet are shifted one or more positions to obtain the encryption alphabet.

A) Caesar
B) Roman
C) Augustus
D) Romani
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
18
A(n) ____________________ is a special word, phrase, or binary number that is used during encryption or decryption to manipulate the data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
19
Even the best encryption algorithm can be outdone by improper use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
20
A(n) ____________________ cipher is an algorithm that encrypts or decrypts blocks of data, such as 64-bit or 128-bit chunks of information at a time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
21
How is data hidden inside a WAV?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
22
Match between columns
Involves taking encrypted information and putting it back into the original form
Cryptography
Involves taking encrypted information and putting it back into the original form
Encryption
Involves taking encrypted information and putting it back into the original form
Decryption
Involves taking encrypted information and putting it back into the original form
Symmetric encryption
Involves taking encrypted information and putting it back into the original form
Asymmetric encryption
Two keys are used to encrypt and decrypt the data
Cryptography
Two keys are used to encrypt and decrypt the data
Encryption
Two keys are used to encrypt and decrypt the data
Decryption
Two keys are used to encrypt and decrypt the data
Symmetric encryption
Two keys are used to encrypt and decrypt the data
Asymmetric encryption
A single key is used to encrypt and decrypt the data
Cryptography
A single key is used to encrypt and decrypt the data
Encryption
A single key is used to encrypt and decrypt the data
Decryption
A single key is used to encrypt and decrypt the data
Symmetric encryption
A single key is used to encrypt and decrypt the data
Asymmetric encryption
The process to change something easy to read into something that is difficult to read
Cryptography
The process to change something easy to read into something that is difficult to read
Encryption
The process to change something easy to read into something that is difficult to read
Decryption
The process to change something easy to read into something that is difficult to read
Symmetric encryption
The process to change something easy to read into something that is difficult to read
Asymmetric encryption
Involves taking data and coding it into a different, unreadable form
Cryptography
Involves taking data and coding it into a different, unreadable form
Encryption
Involves taking data and coding it into a different, unreadable form
Decryption
Involves taking data and coding it into a different, unreadable form
Symmetric encryption
Involves taking data and coding it into a different, unreadable form
Asymmetric encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
23
What is a frequency analysis?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
24
Describe asymmetric encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
25
Describe symmetric encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
26
Discuss the encryption strength of symmetric and asymmetric encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.