⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
Cyber Security Exam 2 with correct answers
⪛⪴⪴⪷⪱⪘⪞⪴⪸ε ΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ε ΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ε ΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
Cryptography - correct answer ✔protects information even when it is not under
your physical control
Uses of Encryption - correct answer ✔Privacy, Authenticity, Integrity,
Nonrepudiation
Nonrepudiation - correct answer ✔Positive proof that a message or action
originated with a certain party
Process of Encryption - correct answer ✔Key & Plaintext in Algorithm which
creates a ciphertext
Kerckhoff's Principle - correct answer ✔We assume that threats are familiar
with how our cryptography works
All security rests in a secret key
Types of Cryptanalysis - correct answer ✔Known Ciphertext, or Ciphertext Only
All we know is the ciphertext
Most difficult situation, but common
Known Plaintext
We know the plaintext to match some of the ciphertext encrypted with a
particular key
Chosen Plaintext
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
, ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
We can choose some plaintext to encipher with our victim's cipher, and retrieve
the ciphertext
Replace each letter in a text by the 3rd letter following it in the alphabet -
correct answer ✔Caesar Cipher
Uses a series of different rotations
The "key" may be a word - each letter indicates a rotation - correct answer
✔Vignère Ciphers
Encrypted telegram from foreign secretary of the German empire to German
ambassador in Mexico - correct answer ✔Zimmerman Telegram
Enigma Machine - correct answer ✔Replaced letters as they were typed
Substitutions were computed using a key and a set of switches and rotors
Computer-Based Encryption - correct answer ✔DES and AES
DES supported how many bits - correct answer ✔56-bits
AES supported how many bits - correct answer ✔128 bits, 192 bits and 265 bits
Key stream - correct answer ✔It is a stream of bits with these properties:
Attackers can't predict its contents in practice
All trusted recipients either
have a copy of the same key stream, or
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
Cyber Security Exam 2 with correct answers
⪛⪴⪴⪷⪱⪘⪞⪴⪸ε ΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ε ΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ε ΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
Cryptography - correct answer ✔protects information even when it is not under
your physical control
Uses of Encryption - correct answer ✔Privacy, Authenticity, Integrity,
Nonrepudiation
Nonrepudiation - correct answer ✔Positive proof that a message or action
originated with a certain party
Process of Encryption - correct answer ✔Key & Plaintext in Algorithm which
creates a ciphertext
Kerckhoff's Principle - correct answer ✔We assume that threats are familiar
with how our cryptography works
All security rests in a secret key
Types of Cryptanalysis - correct answer ✔Known Ciphertext, or Ciphertext Only
All we know is the ciphertext
Most difficult situation, but common
Known Plaintext
We know the plaintext to match some of the ciphertext encrypted with a
particular key
Chosen Plaintext
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
, ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
We can choose some plaintext to encipher with our victim's cipher, and retrieve
the ciphertext
Replace each letter in a text by the 3rd letter following it in the alphabet -
correct answer ✔Caesar Cipher
Uses a series of different rotations
The "key" may be a word - each letter indicates a rotation - correct answer
✔Vignère Ciphers
Encrypted telegram from foreign secretary of the German empire to German
ambassador in Mexico - correct answer ✔Zimmerman Telegram
Enigma Machine - correct answer ✔Replaced letters as they were typed
Substitutions were computed using a key and a set of switches and rotors
Computer-Based Encryption - correct answer ✔DES and AES
DES supported how many bits - correct answer ✔56-bits
AES supported how many bits - correct answer ✔128 bits, 192 bits and 265 bits
Key stream - correct answer ✔It is a stream of bits with these properties:
Attackers can't predict its contents in practice
All trusted recipients either
have a copy of the same key stream, or
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ