### Q1. Which of the following provides a visual representation of the patterns of an algorithm? a) Flow analysis b) Flowchart c) Pseudocode d) Gantt chart

### Answers:

Flowchat

### Q2. If using the MD5 hashing algorithm, what is the length to which each message is padded?

### Answers:

512 bits

### Q3. “Why is IPsec considered to be a transparent security protocol? - Ipsec packets can be viewed by anyone - IPsec is designed to not require modifications of programs, or additional training, or additional client setup. - Ipsec‘s design and packet header contents are open sourced technologies - IPsec uses the Transparent Encryption (TE) algorithm.“

### Answers:

IPsec is designed to not require modifications of programs, or additional training, or additional client setup.

### Q4. Which of these is NOT a characteristic of a secure hash algorithm? A) Collisions should be rare. B) The results of a hash function should not be reversed. C) The hash should always be the same fixed size. D) A message cannot be produced from a predefined hash.

### Answers:

Collisions should be rare.

### Q5. Which of the following is NOT an encryption algorithm used by SSH?

### Answers:

SHA-2

### Q6. A genetic algorithm is an approach to solving problems based on the _____.

### Answers:

theory of evolution

### Q7. What two key lengths are the most popular for the SHA-2 hashing algorithm?

### Answers:

256, 512

### Q8. Regardless of the algorithm being used, a search through an array is always performed a. from lowest to highest element b. from highest to lowest element c. beginning with the middle element d. using a binary search e. None of these

### Answers:

None of these

### Q9. What is the term used for the value that is searched for in a search algorithm? A ) stringValue B ) searchValue C ) matchValue D ) flag E ) None of these

### Answers:

searchValue

### Q10. A key that is generated by a symmetric cryptographic algorithm is said to be a: Private key Public Key Symmetric key Shared key

### Answers:

Private Key

### Q11. What causes the economy to move from its short-run equilibrium to its long-run equilibrium? The government increases taxes to curb aggregate demand. Nominal wages, prices, and perceptions adjust upward to this new price level. The government increases spending to increase aggregate demand. Nominal wages, prices, and perceptions adjust downward to this new price level.

### Answers:

Nominal wages, prices, and perceptions adjust downward to this new price level.

### Q12. Which sorting algorithm moves elements to their final sorted position in the array?

### Answers:

selection

### Q13. Which sorting algorithm moves elements to their final sorted position in the array?

### Answers:

selection

### Q14. The QuickSort algorithm works on the basis of A) three sublists B) two sublists and a pivot C) two pivots and a sublist D) three pivots E) None of these

### Answers:

B) two sublists and a pivot

### Q15. Suppose that a country‘s inflation rate increases sharply. As a result, the inflation tax on holders of money ???.

### Answers:

increases

### Q16. Popular cryptosystems use a hybrid combination of symmetric and asymmetric algorithms.

### Answers:

TRUE

### Q17. What is the mass % of carbon in dimethylsulfoxide (C2H6SO) rounded to three significant figures? A) 25.4 B) 28.6 C) 30.7 D) 7.74 E) 78.1

### Answers:

C

### Q18. What is the mass % of carbon in dimethylsulfoxide (C2H6SO) rounded to three significant figures? A) 25.4 B) 28.6 C) 30.7 D) 7.74 E) 78.1

### Answers:

C

### Q19. A sorting algorithm can be used to arrange a set of ________ in ________ order. a) strings, ascending b) numeric values, descending c) numeric values, ascending d) strings, descending e) All of the above

### Answers:

e) All of the above

### Q20. Which refers to a text-based approach to documenting an algorithm?

### Answers:

Pseudocode

### Q21. What statement regarding the different versions of the SHA hashing algorithm is accurate? a. SHA-0 is the most secure version of SHA. b. SHA-1 supports a 128-bit hash function. c. SHA-2 only supports a 256-bit hash. d. SHA-2 and SHA-3 both support the same hash lengths.

### Answers:

SHA-2 and SHA-3 both support the same hash lengths.

### Q22. Which algorithm is used by the OSPF routing process to construct the SPF tree on a router?

### Answers:

Dijkstra‘s algorithm Refer to curriculum topic: 5.3.1 OSPF routing process uses Dijkstra‘s algorithm to construct the SPF tree. DUAL algorithm is used by the EIGRP routing protocol. Bellman-Ford algorithm is used by RIP routing protocol. Path vector protocol is the protocol used by BGP.

### Q23. Which of the following is a sorting algorithm?

### Answers:

All of the above

### Q24. Show the effect of the following event on the market for minivans: Engineers develop new automated machinery for the production of minivans.

### Answers:

Supply curve shifts to the right

### Q25. A sorting algorithm is used to locate a specific item in a larger collection of data. True False

### Answers:

FALSE

### Q26. What is NOT a valid encryption key length for use with the Blowfish algorithm?

### Answers:

32 bits 64 bits 256 bits *512 bits*

### Q27. Security mechanisms typically do not involve more than one particular algorithm or protocol.

### Answers:

FALSE

### Q28. Security mechanisms typically do not involve more than one particular algorithm or protocol.

### Answers:

FALSE

### Q29. Indicate whether each of the following allocations is efficient or inefficient. Allocations A B C D

### Answers:

A= Efficient B= Efficient C= Inefficient D= Inefficient

### Q30. In a sequential search algorithm, the Boolean variable used as a flag is initialized to TRUE. - True - False

### Answers:

FALSE

### Q31. What does the variable middle represent in a binary search algorithm?

### Answers:

Subscript of the midpoint

### Q32. It is the responsibility of a routing algorithm to find a datagram‘s path through a network.

### Answers:

TRUE

### Q33. Which hashing algorithm below is used with NTLMv2‘s Hashed Message Authentication Code?

### Answers:

MD5

### Q34. Which of the following is not a way of representing algorithms? A. Stepwise refinement B. Pseudocode C. Flowchart D. Programming language

### Answers:

A. Stepwise refinement

### Q35. The process of ethical decision-making or ethical algorithm typically begins with:

### Answers:

identifying which stakeholders a decision would affect and in what ways.

### Q36. Translating an algorithm into a programming language is called ________.

### Answers:

coding

### Q37. The first-come, first-served (FCFS) algorithm is fine for most ____ systems. Answers: a. batch b. user initiated c. interactive d. multiuser

### Answers:

Batch

### Q38. You should express the complexity of an algorithm in terms of it: a) space requirements b) execution time c) problem size d) overall complexity

### Answers:

c) problem size

### Q39. A database can best be described as:

### Answers:

a collection of data that can be sorted and searched using search algorithms.

### Q40. A data-flow diagram provides a visual representation of an algorithm.

### Answers:

FALSE

### Q41. The ________ design technique can be used to break down an algorithm into functions.

### Answers:

top-down

### Q42. Product cipher is an encryption algorithm that has no corresponding decryption algorithm. True or False?

### Answers:

FALSE

### Q43. The most basic type of cryptographic algorithm is a ____ algorithm.

### Answers:

hash

### Q44. which of the following is the strongest hashing algorithm

### Answers:

sha - 1

### Q45. In your encryption algorithm, you removed every third letter. Which algorithm did you use? -expansion -compaction -transposition -substitution

### Answers:

compaction

### Q46. Which of the following is true about general knowledge? It is both excludable and rival in consumption. It is not excludable but rival in consumption. It is neither excludable nor rival in consumption. It is excludable and not rival in consumption.

### Answers:

It is neither excludable nor rival in consumption.

### Q47. An algorithm is a guiding rule used to solve problems or make decisions.

### Answers:

f

### Q48. This type of algorithm rearranges the values stored in an array in some particular order.

### Answers:

Sorting Algorithm

### Q49. You must always use the same algorithm to encrypt information and decrypt the same information.

### Answers:

FALSE

### Q50. The asymmetric cryptography algorithm most commonly used is:

### Answers:

RSA

### Q51. Which of the following is NOT an encryption algorithm used by SSH?

### Answers:

SHA-2

### Q52. A cryptovariable is a value representing the application of a hash algorithm on a message. A) True B) False

### Answers:

B) False

### Q53. What type of cryptographic algorithm creates a unique digital fingerprint of a set of data?

### Answers:

A. Hash

### Q54. The ARCfour encryption algorithm uses variable-length keys up to 2048 bits in length.?

### Answers:

TRUE

### Q55. What type of encryption algorithm uses two keys to encrypt and decrypt data?

### Answers:

asymmetric

### Q56. The Linux page replacement algorithm is an expanded version of the ____ replacement policy. a. clock page c. page clock b. clock d. page

### Answers:

A

### Q57. Which searching algorithm requires the array to be ordered?

### Answers:

Binary

### Q58. List and describe the characteristics a hashing algorithm must have to be considered secure.

### Answers:

Fixed size: All data produces the same size digest. Unique: Two different sets of data cannot produce the same digest, which is known as a collision. Changing a single letter in one data set should produce an entirely different digest. Original: It should be impossible to produce a data set that has a desired or predefined hash. Secure: The resulting digest can‘t be reversed in order to determine the original plaintext.

### Q59. Another way to express an algorithm is with pseudocode.

### Answers:

TRUE

### Q60. The binary search algorithm is an example of an algorithm in which of the following classes?

### Answers:

Θ(log2n)

### Q61. What is the average compression ratio for the gzip utility using the LZ77 compression algorithm? a. 40%-50% b. 50%-60% c. 60%-70% d. 70%-80%

### Answers:

C

### Q62. The row reduction algorithm applies only to augmented matrices for a linear system. Is this statement true or false?

### Answers:

The statement is false. The algorithm applies to any matrix, whether or not the matrix is viewed as an augmented matrix for a linear system.

### Q63. A retina scanner has become the most common type of standard biometrics.

### Answers:

FALSE

### Q64. UNIX uses the ____ page replacement algorithm. a. least recently used c. priority b. round robin d. oldest first

### Answers:

A

### Q65. Which of the following is an advantage of the Keccak algorithm?

### Answers:

It is a compact algorithm that could be considered ideal for smaller devices and appliances