Public Key Encryption

Public Key Encryption

12th Grade

10 Qs

quiz-placeholder

Similar activities

CSP Unit 10 Cybersecurity

CSP Unit 10 Cybersecurity

12th Grade - University

13 Qs

Data Protection part 2

Data Protection part 2

12th Grade

15 Qs

Unit 17 Encryption and Security Quiz

Unit 17 Encryption and Security Quiz

12th Grade

10 Qs

Encryption and Caesar Cipher Quiz

Encryption and Caesar Cipher Quiz

9th - 12th Grade

15 Qs

Security

Security

12th Grade - University

12 Qs

1.3.1 - Encryption & Hashing

1.3.1 - Encryption & Hashing

8th - 12th Grade

13 Qs

Unit 10 Cybersecurity CSP

Unit 10 Cybersecurity CSP

12th Grade - University

13 Qs

CSP Unit 10 Pre-Assessment - Cybersecurity

CSP Unit 10 Pre-Assessment - Cybersecurity

9th - 12th Grade

10 Qs

Public Key Encryption

Public Key Encryption

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Ralph Ellis

Used 65+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Agnes is sending a secure message to Barry. Which key should she use to encrypt the message so that only Barry can decrypt it?

Agnes's Public Key

Agnes's Private Key

Barry's Public Key

Barry's Private Key

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Agnes is sending a secure message to Barry. Which key will Barry use to decrypt the message?

Agnes's Public Key

Agnes's Private Key

Barry's Public Key

Barry's Private Key

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many keys are used in asymmetric encryption?

2

1

0

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When creating a digital signature, which key is used to encrypt the message digest?

Sender's public key

Sender's private key

Receiver's public key

Receiver's private key

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How does the receiver of a message use the digital signature to verify that the message has not been tampered with?

Decrypt the signature with the sender's public key and compare with a hash of the received message

Decrypt the signature and unhash it to see if it is the same as the received message

Telephones the sender to request confirmation

Hash the encrypted digest of the received message using the private key of the sender's certification authority

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alfie's private key has been used to encrypt a message. Which key can be used to decrypt the message?

Alfie's public key

Alfie's private key

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption method using public and private keys

Symmetric

Asymmetric

Vernam

Enigma

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?