Cryptography

Cryptography

University

15 Qs

quiz-placeholder

Similar activities

Cryptography

Cryptography

6th Grade - University

15 Qs

DAA quiz2

DAA quiz2

University

15 Qs

Arquitetura IPv6

Arquitetura IPv6

1st Grade - University

10 Qs

CP N5 Theory Test 1

CP N5 Theory Test 1

University

10 Qs

Introduction to AI - Healthcare & Business

Introduction to AI - Healthcare & Business

University - Professional Development

10 Qs

Python Quiz For Starters

Python Quiz For Starters

3rd Grade - Professional Development

17 Qs

Hashing

Hashing

University

20 Qs

Algorithms

Algorithms

University

12 Qs

Cryptography

Cryptography

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Hitesh Grewal

Used 127+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an important disadvantage of using a public key algorithm compared to a symmetric algorithm?

Asymmetric algorithm provides better access control.

Asymmetric algorithm is a faster process.

Asymmetric algorithm provides nonrepudiation of delivery.

Asymmetric algorithm is more difficult to implement.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When a user needs to provide message integrity, what options may be best?

Send a digital signature of the message to the recipient

Encrypt the message with a symmetric algorithm and send it

Encrypt the message with a private key so the recipient can decrypt with

the corresponding public key

Create a checksum, append it to the message, encrypt the message, then

send to recipient.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The two methods of encrypting data are?

Substitution and transposition

Block and stream

Symmetric and asymmetric

DES and AES

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cryptography supports all of the core principles of information security except

Availability

Confidentiality

Integrity

Authenticity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The only cipher system said to be unbreakable by brute force is

AES

DES

One-time pad

Triple DES

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data that is in an unencrypted form is referred to as which of the following?

plain text

crypt text

cleartext

simpletext

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which type of encryption is the same key used to encrypt and decrypt data?

public

asymmetric

symmetric

private

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?