
FIT1047 week 11
Authored by Jared Abidi
Computers
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What keys are used in asymmetric encryption?
Two public
One public, one private
Two private
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In cybersecurity, what is "integrity"?
Messages cannot be intercepted by a third party
Messages cannot be read by a third party
Messages cannot be altered by a third party
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of these encryption techniques are symmetric
AES
RSA
ROT-13
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of these are disadvantages of symmetric encrpytion?
Integrity cannot be guaranteed
All sender/receiver pairs need unique secret keys, meaning keys need to be really large
Since the key is secret, it needs to somehow be securely established first
Symmetric encryption is usually more computationally difficult than asymmetric encryption
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does a hash function do?
Encrypts a given input using a key
Turns an input of any length into an output of a fixed length
Decrypts a given input using a key
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is an essential feature for making a hash function useful for cryptography?
The hash function should generate a different output each time, based on random generators
It should be infeasible to reverse the hash function and get the input back from just the output
It should be possible to get the input to the hash function back by using the key
The hash function should take a long time to run
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is MAC (in the context of cryptography)
Media Access Control
Message Access Control
Message Authentication Code
Message Authentication Crytography
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?