Cybersecurity training - Cryptography 2

Cybersecurity training - Cryptography 2

Professional Development

13 Qs

quiz-placeholder

Similar activities

Security Essentials - Encryptie herhaling

Security Essentials - Encryptie herhaling

Professional Development

11 Qs

GEMATMW - Cryptography

GEMATMW - Cryptography

University - Professional Development

16 Qs

Enkripsi - Pretest

Enkripsi - Pretest

Professional Development

10 Qs

IT ENGLISH: Research Project Topics - Encryption

IT ENGLISH: Research Project Topics - Encryption

Professional Development

10 Qs

Segurança em Redes Sem Fio

Segurança em Redes Sem Fio

1st Grade - Professional Development

10 Qs

Chapter 2:The Cybersecurity Cube

Chapter 2: The Cybersecurity Cube

Professional Development

12 Qs

Python Turtle

Python Turtle

KG - Professional Development

11 Qs

Cyber Security Cryptology Tools

Cyber Security Cryptology Tools

Professional Development

13 Qs

Cybersecurity training - Cryptography 2

Cybersecurity training - Cryptography 2

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Mena Khalil

Used 24+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Please choose the algorithm that requires the least resources to encrypt/decrypt

AES

RSA

ECC

DSS

2.

REORDER QUESTION

1 min • 5 pts

Reorder the following steps of Deffie-Hellman Key Exchange process

Exchange public keys

calculate shared secret key

Agree on prime and generator

Generate a private key

calculate public key

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

the blowfish encryption requires public key exchange

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

you want to choose an algorithm to encrypt your data (at rest) with security and performance in mind

AES-ECB

AES-CBC

AES-CTR

RSA

DSS

5.

MATCH QUESTION

1 min • 5 pts

Match the following

symmetric encryption algorithm

RSA

a stream cipher

chacha20

used to validate identity

blowfish

message authentication

PKI

asymmetric encryption algorithm

HMAC

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Bob is sending Alice a message, what key does he need to sign the message

Bob's public

Bob's private

Alice's public

Alice's private

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Alice is sending Bob a message, what key does she need to encrypt the message

Bob's public

Bob's private

Alice's public

Alice's private

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?