C3 Crypto & PKI Review

C3 Crypto & PKI Review

9th - 12th Grade

26 Qs

quiz-placeholder

Similar activities

Unit 4 - Review

Unit 4 - Review

9th - 11th Grade

21 Qs

Unit 1 Exam: Computational Thinking

Unit 1 Exam: Computational Thinking

12th Grade

25 Qs

Year 9 Computing Unit 1 Assessment - Cracking the code

Year 9 Computing Unit 1 Assessment - Cracking the code

7th Grade - University

30 Qs

11al网络安全

11al网络安全

11th Grade - University

22 Qs

C3.5 - Intro to Blockchain

C3.5 - Intro to Blockchain

9th Grade

21 Qs

CIS IT Fundamentals Chapter 6

CIS IT Fundamentals Chapter 6

11th - 12th Grade

28 Qs

Wireless Communication Technologies Quiz

Wireless Communication Technologies Quiz

10th Grade

21 Qs

Caesar Cipher

Caesar Cipher

9th Grade

25 Qs

C3 Crypto & PKI Review

C3 Crypto & PKI Review

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Melody Kelley

Used 6+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which feature of cryptography is used to prove a user's identity and prevent an individual from fraudulently reneging on an action?

Confidentiality

Nonrepudiation

Obfuscation

Authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which algorithm encrypts and decrypts data using the same key?

Hash algorithm

Symmetric cryptographic algorithm

Rivest-Shamir-Adleman algorithm

Asymmetric cryptographic algorithm

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a state of data, where data is transmitted across a network?

Data in processing

Data at rest

Data in transit

3DES

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

John receives an encrypted document using asymmetric cryptography from Alex. Which process should Alex use along with asymmetric cryptography so that John can be sure that the received document is real, from Alex, and unaltered?

Elliptic curve cryptography

Digital signature algorithm

Rivest-Shamir-Alderman

Symmetric cryptography

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cryptographic method should Susanne use to ensure that a document can be encrypted with a key and decrypted with a different key?

Public

Ephemeral

Symmetric

Asymmetric

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack sees an attacker attempt to determine the hash function's input strings that produce the same hash result?

Known ciphertext attack

Downgrade attack

Collision attack

Birthday attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A new e-commerce startup with global operations is looking for a method to manage its supply-chain data for production. Instead of using bar codes, scanners, paper forms, and individual databases, making the system difficult to use, which method should be used to quickly track shipments?

File and file system cryptography

USB device encryption

Full disk encryption

Blockchain

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?