Question
Cryptography is defined as:(2 points)
Responses
Sensitive information sent over networks that needs to be secured.
Sensitive information sent over networks that needs to be secured.
The act of stealing personal information online.
The act of stealing personal information online.
Verified authority to view information, such as a password or key.
Verified authority to view information, such as a password or key.
The practice of encoding information so only authorized people can read it.
The practice of encoding information so only authorized people can read it.
Question 2
In order to decrypt an encrypted message, pass the encrypted message and the _____________ to the decrypt function.(2 points)
Responses
cipertext
cipertext
cryptology
cryptology
decrypted message
decrypted message
key
key
Question 3
Hash functions got the name "hash" because it's easy to compute the function with a given input, but nearly impossible to reverse engineer the hash function to get the original input. (2 points)
Responses
True
True
False
False
Question 4
What is a collision in a hash function?(2 points)
Responses
There are few outputs, but a lot of inputs.
There are few outputs, but a lot of inputs.
2 inputs map to the same output
2 inputs map to the same output
There are few inputs, but a lot of outputs.
There are few inputs, but a lot of outputs.
2 outputs come from the same input
2 outputs come from the same input
Question 5
What do most attacks on hash functions involve?
A. Finding Collisions
B. Pre-generating millions of hashes and comparing them to the plain text that generates it.
C. Really good random guessing.
(2 points)
Responses
A and B
A and B
A and C
A and C
B and C
B and C
Question 6
_____________ is the process of decrypting coded messages without being told the key.(2 points)
Responses
Cryptology
Cryptology
Cryptanalysis
Cryptanalysis
Cryptography
Cryptography
Question 7
The practice of solving and writing encryptions is ______________.(2 points)
Responses
cryptology
cryptology
cryptography
cryptography
cryptanalysis
cryptanalysis
Question 8
________________ is the output from any input that has been processed through a hashing algorithm/function.(2 points)
Responses
Digest
Digest
Collision
Collision
Firewalls
Firewalls
Question 9
A general property of a good encryption is good encryptions are easy to encrypt but very hard to decrypt.(2 points)
Responses
True
True
False
False
Question 10
The word hashing literally means to scramble.(2 points)
Responses
True
True
False
False
Skip to navigation
Responses
Sensitive information sent over networks that needs to be secured.
Sensitive information sent over networks that needs to be secured.
The act of stealing personal information online.
The act of stealing personal information online.
Verified authority to view information, such as a password or key.
Verified authority to view information, such as a password or key.
The practice of encoding information so only authorized people can read it.
The practice of encoding information so only authorized people can read it.
Question 2
In order to decrypt an encrypted message, pass the encrypted message and the _____________ to the decrypt function.(2 points)
Responses
cipertext
cipertext
cryptology
cryptology
decrypted message
decrypted message
key
key
Question 3
Hash functions got the name "hash" because it's easy to compute the function with a given input, but nearly impossible to reverse engineer the hash function to get the original input. (2 points)
Responses
True
True
False
False
Question 4
What is a collision in a hash function?(2 points)
Responses
There are few outputs, but a lot of inputs.
There are few outputs, but a lot of inputs.
2 inputs map to the same output
2 inputs map to the same output
There are few inputs, but a lot of outputs.
There are few inputs, but a lot of outputs.
2 outputs come from the same input
2 outputs come from the same input
Question 5
What do most attacks on hash functions involve?
A. Finding Collisions
B. Pre-generating millions of hashes and comparing them to the plain text that generates it.
C. Really good random guessing.
(2 points)
Responses
A and B
A and B
A and C
A and C
B and C
B and C
Question 6
_____________ is the process of decrypting coded messages without being told the key.(2 points)
Responses
Cryptology
Cryptology
Cryptanalysis
Cryptanalysis
Cryptography
Cryptography
Question 7
The practice of solving and writing encryptions is ______________.(2 points)
Responses
cryptology
cryptology
cryptography
cryptography
cryptanalysis
cryptanalysis
Question 8
________________ is the output from any input that has been processed through a hashing algorithm/function.(2 points)
Responses
Digest
Digest
Collision
Collision
Firewalls
Firewalls
Question 9
A general property of a good encryption is good encryptions are easy to encrypt but very hard to decrypt.(2 points)
Responses
True
True
False
False
Question 10
The word hashing literally means to scramble.(2 points)
Responses
True
True
False
False
Skip to navigation
Answers
Answered by
GPT-4o mini
Here are the answers to the questions you provided:
**Question 1**
*What is cryptography?*
**Answer:** The practice of encoding information so only authorized people can read it.
---
**Question 2**
*In order to decrypt an encrypted message, pass the encrypted message and the _____________ to the decrypt function.*
**Answer:** key
---
**Question 3**
*Hash functions got the name "hash" because it's easy to compute the function with a given input, but nearly impossible to reverse engineer the hash function to get the original input.*
**Answer:** True
---
**Question 4**
*What is a collision in a hash function?*
**Answer:** 2 inputs map to the same output
---
**Question 5**
*What do most attacks on hash functions involve?*
**Answer:** A and B
---
**Question 6**
*_____________ is the process of decrypting coded messages without being told the key.*
**Answer:** Cryptanalysis
---
**Question 7**
*The practice of solving and writing encryptions is ______________.*
**Answer:** Cryptology
---
**Question 8**
*________________ is the output from any input that has been processed through a hashing algorithm/function.*
**Answer:** Digest
---
**Question 9**
*A general property of a good encryption is good encryptions are easy to encrypt but very hard to decrypt.*
**Answer:** True
---
**Question 10**
*The word hashing literally means to scramble.*
**Answer:** False
---
Feel free to reach out if you have more questions or need further clarification!
**Question 1**
*What is cryptography?*
**Answer:** The practice of encoding information so only authorized people can read it.
---
**Question 2**
*In order to decrypt an encrypted message, pass the encrypted message and the _____________ to the decrypt function.*
**Answer:** key
---
**Question 3**
*Hash functions got the name "hash" because it's easy to compute the function with a given input, but nearly impossible to reverse engineer the hash function to get the original input.*
**Answer:** True
---
**Question 4**
*What is a collision in a hash function?*
**Answer:** 2 inputs map to the same output
---
**Question 5**
*What do most attacks on hash functions involve?*
**Answer:** A and B
---
**Question 6**
*_____________ is the process of decrypting coded messages without being told the key.*
**Answer:** Cryptanalysis
---
**Question 7**
*The practice of solving and writing encryptions is ______________.*
**Answer:** Cryptology
---
**Question 8**
*________________ is the output from any input that has been processed through a hashing algorithm/function.*
**Answer:** Digest
---
**Question 9**
*A general property of a good encryption is good encryptions are easy to encrypt but very hard to decrypt.*
**Answer:** True
---
**Question 10**
*The word hashing literally means to scramble.*
**Answer:** False
---
Feel free to reach out if you have more questions or need further clarification!
There are no human answers yet. A form for humans to post answers is coming very soon!