Cryptography is defined as:(2 points)

Responses

Sensitive information sent over networks that needs to be secured.
Sensitive information sent over networks that needs to be secured.

The act of stealing personal information online.
The act of stealing personal information online.

Verified authority to view information, such as a password or key.
Verified authority to view information, such as a password or key.

The practice of encoding information so only authorized people can read it.
The practice of encoding information so only authorized people can read it.
Question 2
In order to decrypt an encrypted message, pass the encrypted message and the _____________ to the decrypt function.(2 points)
Responses

cipertext
cipertext

cryptology
cryptology

decrypted message
decrypted message

key
key
Question 3
Hash functions got the name "hash" because it's easy to compute the function with a given input, but nearly impossible to reverse engineer the hash function to get the original input. (2 points)
Responses

True
True

False
False
Question 4
What is a collision in a hash function?(2 points)
Responses

There are few outputs, but a lot of inputs.
There are few outputs, but a lot of inputs.

2 inputs map to the same output
2 inputs map to the same output

There are few inputs, but a lot of outputs.
There are few inputs, but a lot of outputs.

2 outputs come from the same input
2 outputs come from the same input
Question 5
What do most attacks on hash functions involve?

A. Finding Collisions
B. Pre-generating millions of hashes and comparing them to the plain text that generates it.
C. Really good random guessing.

(2 points)
Responses

A and B
A and B

A and C
A and C

B and C
B and C
Question 6
_____________ is the process of decrypting coded messages without being told the key.(2 points)
Responses

Cryptology
Cryptology

Cryptanalysis
Cryptanalysis

Cryptography
Cryptography
Question 7
The practice of solving and writing encryptions is ______________.(2 points)
Responses

cryptology
cryptology

cryptography
cryptography

cryptanalysis
cryptanalysis
Question 8
________________ is the output from any input that has been processed through a hashing algorithm/function.(2 points)
Responses

Digest
Digest

Collision
Collision

Firewalls
Firewalls
Question 9
A general property of a good encryption is good encryptions are easy to encrypt but very hard to decrypt.(2 points)
Responses

True
True

False
False
Question 10
The word hashing literally means to scramble.(2 points)
Responses

True
True

False
False
Skip to navigation

1 answer

Here are the answers to the questions you provided:

Question 1
What is cryptography?
Answer: The practice of encoding information so only authorized people can read it.


Question 2
In order to decrypt an encrypted message, pass the encrypted message and the _____________ to the decrypt function.
Answer: key


Question 3
Hash functions got the name "hash" because it's easy to compute the function with a given input, but nearly impossible to reverse engineer the hash function to get the original input.
Answer: True


Question 4
What is a collision in a hash function?
Answer: 2 inputs map to the same output


Question 5
What do most attacks on hash functions involve?
Answer: A and B


Question 6
_____________ is the process of decrypting coded messages without being told the key.
Answer: Cryptanalysis


Question 7
The practice of solving and writing encryptions is ______________.
Answer: Cryptology


Question 8
________________ is the output from any input that has been processed through a hashing algorithm/function.
Answer: Digest


Question 9
A general property of a good encryption is good encryptions are easy to encrypt but very hard to decrypt.
Answer: True


Question 10
The word hashing literally means to scramble.
Answer: False


Feel free to reach out if you have more questions or need further clarification!