C3 Crypto & PKI Review

C3 Crypto & PKI Review

9th - 12th Grade

26 Qs

quiz-placeholder

Similar activities

AP CSP - Unit 4 Khan Academy

AP CSP - Unit 4 Khan Academy

11th - 12th Grade

21 Qs

Digital certificates and digital signatures

Digital certificates and digital signatures

12th Grade

21 Qs

Caesar Cipher Check for Understanding

Caesar Cipher Check for Understanding

12th Grade

21 Qs

Module 6

Module 6

12th Grade

21 Qs

AP-CSP Unit 4 Test Review

AP-CSP Unit 4 Test Review

11th - 12th Grade

21 Qs

CSP Vocab Practice 2

CSP Vocab Practice 2

10th - 12th Grade

21 Qs

Cybersecurity Final Review Quizizz

Cybersecurity Final Review Quizizz

9th - 12th Grade

31 Qs

Cryptography

Cryptography

12th Grade

24 Qs

C3 Crypto & PKI Review

C3 Crypto & PKI Review

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Melody Kelley

Used 6+ times

FREE Resource

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which feature of cryptography is used to prove a user's identity and prevent an individual from fraudulently reneging on an action?

Confidentiality

Nonrepudiation

Obfuscation

Authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which algorithm encrypts and decrypts data using the same key?

Hash algorithm

Symmetric cryptographic algorithm

Rivest-Shamir-Adleman algorithm

Asymmetric cryptographic algorithm

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a state of data, where data is transmitted across a network?

Data in processing

Data at rest

Data in transit

3DES

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

John receives an encrypted document using asymmetric cryptography from Alex. Which process should Alex use along with asymmetric cryptography so that John can be sure that the received document is real, from Alex, and unaltered?

Elliptic curve cryptography

Digital signature algorithm

Rivest-Shamir-Alderman

Symmetric cryptography

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cryptographic method should Susanne use to ensure that a document can be encrypted with a key and decrypted with a different key?

Public

Ephemeral

Symmetric

Asymmetric

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack sees an attacker attempt to determine the hash function's input strings that produce the same hash result?

Known ciphertext attack

Downgrade attack

Collision attack

Birthday attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A new e-commerce startup with global operations is looking for a method to manage its supply-chain data for production. Instead of using bar codes, scanners, paper forms, and individual databases, making the system difficult to use, which method should be used to quickly track shipments?

File and file system cryptography

USB device encryption

Full disk encryption

Blockchain

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?