
This is the Online Practice Quiz in Cryptography part 2 from the book, Data Communications and Networking 4th Edition by Behrouz A. Forouzan. If you are looking for a reviewer in Electronics Systems and Technologies (Communications Engineering) this will definitely help you test your knowledge and skill before taking the Board Exam.
Continue Part II of the Online Practice Quiz
Quiz in Cryptography
Question 11. A(n) _______is a keyless transposition cipher with N inputs and M outputs that uses a table to define the relationship between the input stream and the output stream.
Question 12. The ________ method provides a one-time session key for two parties.
Question 13. One commonly used public-key cryptography method is the ______ algorithm.
Question 14. ________ is the science and art of transforming messages to make them secure and immune to attacks.
Question 15. The ________ cipher reorders the plaintext characters to create a ciphertext.
Question 16. In a(n) ________ cipher, the same key is used by both the sender and receiver.
Question 17. A combination of an encryption algorithm and a decryption algorithm is called a ________.
Question 18. In an asymmetric-key cipher, the receiver uses the ______ key.
Question 19. _______ is a round cipher based on the Rijndael algorithm that uses a 128-bit block of data.
Question 20. A ________ cipher replaces one character with another character. |
More Practice Quiz in Cryptography
Practice Quiz Part 1
Practice Quiz Part 2
Practice Quiz Part 3
Complete Practice Quiz in Data Communications and Networking
Note: After taking this particular quiz, you can proceed to check all the topics.
Post a Comment
Click to see the code!
To insert emoticon you must added at least one space before the code.