Search Header Logo

Public Private Key Review

Authored by Tim Girard

Computers

10th Grade

Used 24+ times

Public Private Key Review
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

What happens when you try to send this package?

The hacker steals the message

The message is delivered securely and Person B can unlock using the private key

The message is delivered securely and Person B can unlock using the normal key

The message is delivered securely but Person B cannot unlock with any key

Person should never send the message

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

What happens when you try to send this package?

The hacker steals the message

The message is delivered securely and Person B can unlock using the private key

The message is delivered securely and Person B can unlock using the normal key

The message is delivered securely and Person B cannot unlock with any key

Person should never send the message

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

What happens when you try to send this package?

The hacker steals the normal key

The normal key is delivered securely and Person B can unlock using the private key

The normal key is delivered securely and Person B can unlock using the normal key

The normal key is delivered securely but Person B cannot unlock with any key

Person should never send the normal key

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

What happens when you try to send this package?

The hacker steals the normal key

The normal key is delivered securely and Person B can unlock using the private key

The normal key is delivered securely and Person B can unlock using the normal key

The normal is delivered securely and Person B cannot unlock with any key

Person should never send the normal key

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

What happens when you try to send this package?

The hacker steals the message

The message is delivered securely and Person B can unlock using the private key

The message is delivered securely and Person B can unlock using the normal key

The message is delivered securely but Person B cannot unlock with any key

Person A should never send the message

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

What happens when you try to send this package?

The hacker steals the message

The message is delivered securely and Person B can unlock using the private key

The message is delivered securely and Person B can unlock using the normal key

The message is delivered securely but Person B cannot unlock with any key

It doesn't make any sense for Person A to send the public key because everyone already has it

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

What happens when you try to send this package?

The hacker steals the message

The message is delivered securely and Person A can unlock using the private key

The message is delivered securely and Person A can unlock using the normal key

The message is delivered securely but Person A cannot unlock with any key

Person B should never send the message

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?