FIT1047 week 11

FIT1047 week 11

University

13 Qs

Student preview

quiz-placeholder

Similar activities

AES Quiz

AES Quiz

University

9 Qs

DES & AES in Cryptography

DES & AES in Cryptography

University

10 Qs

ITBP301_Chapter 01

ITBP301_Chapter 01

University

10 Qs

Security

Security

12th Grade - University

12 Qs

Cryptology Tools

Cryptology Tools

University

15 Qs

Cyber Security

Cyber Security

9th Grade - University

14 Qs

014_Key Exchange - CompTIA Security+ SY0-701 - 1.4

014_Key Exchange - CompTIA Security+ SY0-701 - 1.4

12th Grade - University

15 Qs

ITBP301_Chapter 04

ITBP301_Chapter 04

University

10 Qs

FIT1047 week 11

FIT1047 week 11

Assessment

Quiz

Created by

Jared Abidi

Computers

University

2 plays

Hard

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What keys are used in asymmetric encryption?
Two public
One public, one private
Two private

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cybersecurity, what is "integrity"?
Messages cannot be intercepted by a third party
Messages cannot be read by a third party
Messages cannot be altered by a third party

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of these encryption techniques are symmetric
AES
RSA
ROT-13

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of these are disadvantages of symmetric encrpytion?
Integrity cannot be guaranteed
All sender/receiver pairs need unique secret keys, meaning keys need to be really large
Since the key is secret, it needs to somehow be securely established first
Symmetric encryption is usually more computationally difficult than asymmetric encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a hash function do?
Encrypts a given input using a key
Turns an input of any length into an output of a fixed length
Decrypts a given input using a key

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is an essential feature for making a hash function useful for cryptography?
The hash function should generate a different output each time, based on random generators
It should be infeasible to reverse the hash function and get the input back from just the output
It should be possible to get the input to the hash function back by using the key
The hash function should take a long time to run

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is MAC (in the context of cryptography)
Media Access Control
Message Access Control
Message Authentication Code
Message Authentication Crytography

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?