FIT1047 week 11

FIT1047 week 11

University

13 Qs

quiz-placeholder

Similar activities

Data Structures: Linked Lists and Hashtables

Data Structures: Linked Lists and Hashtables

11th Grade - University

14 Qs

8th module23

8th module23

University

13 Qs

CNS-5-4-21

CNS-5-4-21

University

14 Qs

ECommerece-Quiz-5

ECommerece-Quiz-5

University

10 Qs

CLI Topic 5 - Basic Security

CLI Topic 5 - Basic Security

University

10 Qs

Encryption and Cryptography

Encryption and Cryptography

University

10 Qs

Cybersecurity Fundamentals Week 5 Quiz

Cybersecurity Fundamentals Week 5 Quiz

KG - University

10 Qs

LESSON 6 CRYPTOGRAPHY

LESSON 6 CRYPTOGRAPHY

University

14 Qs

FIT1047 week 11

FIT1047 week 11

Assessment

Quiz

Computers

University

Hard

Created by

Jared Abidi

Used 2+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What keys are used in asymmetric encryption?
Two public
One public, one private
Two private

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cybersecurity, what is "integrity"?
Messages cannot be intercepted by a third party
Messages cannot be read by a third party
Messages cannot be altered by a third party

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of these encryption techniques are symmetric
AES
RSA
ROT-13

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of these are disadvantages of symmetric encrpytion?
Integrity cannot be guaranteed
All sender/receiver pairs need unique secret keys, meaning keys need to be really large
Since the key is secret, it needs to somehow be securely established first
Symmetric encryption is usually more computationally difficult than asymmetric encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a hash function do?
Encrypts a given input using a key
Turns an input of any length into an output of a fixed length
Decrypts a given input using a key

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is an essential feature for making a hash function useful for cryptography?
The hash function should generate a different output each time, based on random generators
It should be infeasible to reverse the hash function and get the input back from just the output
It should be possible to get the input to the hash function back by using the key
The hash function should take a long time to run

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is MAC (in the context of cryptography)
Media Access Control
Message Access Control
Message Authentication Code
Message Authentication Crytography

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?