Search Header Logo

Chapter 4 Cryptography

Authored by Ryan Age

Professional Development

University

Used 1+ times

Chapter 4 Cryptography
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a ciphertext?

Used for encryption and decryption.

Transformation of plaintext.

Cleartext message sent by sender to recipient.

Encrypted message.

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following are the 2 different types of encryption algorithm?

Asymmetric algorithm

Secret Key algorithm

Symmetric algorithm

One Way Hash

algorithm

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is NOT a characteristic of Symmetric algorithm?

Also known as Secret Key Algorithm.

Sender and recipient need to share a common secret key.

Public key Algorithm.

Uses the same key (symmetric/secret key) for encryption and decryption.

4.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which of the following are the issues of using a symmetric algorithm?

(Choose all that applies)

Need shared key

Need to exchange secret key

Sender and recipient may not know each other

Sender and recipient know each other

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

What are the 2 factors that affect the security of encrypted data?

Strength of cryptographic algorithms.

Distance between sender and receiver.

Secrecy .

6.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which of the following are the characteristics of asymmetric algorithm?

Public Key Algorithm.

Single Key Algorithm.

Public and private keys are mathematically related.

Private key – known only to the owner and cannot be derived from encryption key.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a problem of asymmetric algorithm?

Distance is too far.

Sender and recipient may not know each other.

is typically slower (~1000 times) than symmetric algorithm.

Both sender and recipient will have the same secret key for symmetric cryptography operations.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?