Cybersecurity training - Cryptography 2

Cybersecurity training - Cryptography 2

Professional Development

13 Qs

quiz-placeholder

Similar activities

CC in 1 Day

CC in 1 Day

Professional Development

12 Qs

CySa+ PT 4: 3/3

CySa+ PT 4: 3/3

9th Grade - Professional Development

18 Qs

Acronym Exposure 2.0

Acronym Exposure 2.0

Professional Development

15 Qs

Prueba Diagnostica Modulo 2

Prueba Diagnostica Modulo 2

Professional Development

10 Qs

python_intro_question_strings

python_intro_question_strings

Professional Development

9 Qs

ITF - Quiz 14.4 - Uses of Encryption

ITF - Quiz 14.4 - Uses of Encryption

Professional Development

15 Qs

Network Security - Module 15

Network Security - Module 15

Professional Development

9 Qs

Lazarbeam

Lazarbeam

KG - Professional Development

11 Qs

Cybersecurity training - Cryptography 2

Cybersecurity training - Cryptography 2

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Mena Khalil

Used 24+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Please choose the algorithm that requires the least resources to encrypt/decrypt

AES

RSA

ECC

DSS

2.

REORDER QUESTION

1 min • 5 pts

Reorder the following steps of Deffie-Hellman Key Exchange process

calculate shared secret key

Agree on prime and generator

calculate public key

Exchange public keys

Generate a private key

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

the blowfish encryption requires public key exchange

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

you want to choose an algorithm to encrypt your data (at rest) with security and performance in mind

AES-ECB

AES-CBC

AES-CTR

RSA

DSS

5.

MATCH QUESTION

1 min • 5 pts

Match the following

message authentication

chacha20

symmetric encryption algorithm

blowfish

asymmetric encryption algorithm

RSA

used to validate identity

PKI

a stream cipher

HMAC

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Bob is sending Alice a message, what key does he need to sign the message

Bob's public

Bob's private

Alice's public

Alice's private

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Alice is sending Bob a message, what key does she need to encrypt the message

Bob's public

Bob's private

Alice's public

Alice's private

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?