IAS QUIZ 9

IAS QUIZ 9

University

25 Qs

quiz-placeholder

Similar activities

IAS QUIZ 10

IAS QUIZ 10

University

25 Qs

IAS 101 - Week 11 and 12 - Cryptography

IAS 101 - Week 11 and 12 - Cryptography

University

20 Qs

Cryptography

Cryptography

University

23 Qs

98-367

98-367

10th Grade - Professional Development

21 Qs

IAS CH2 QUIZ

IAS CH2 QUIZ

University

25 Qs

Mock Test

Mock Test

University

27 Qs

BAB 11

BAB 11

University

20 Qs

Cybersecurity Essentials Chapter 2 Review

Cybersecurity Essentials Chapter 2 Review

9th Grade - University

20 Qs

IAS QUIZ 9

IAS QUIZ 9

Assessment

Quiz

Computers

University

Easy

Created by

Darwin Vargas

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Asymmetric encryption utilizes only a public key for encryption

and decryption.

T

F

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Asymmetric encryption can be used for confidentiality but not for

authentication.

T

F

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Plaintext is transformed into ciphertext using two keys and a

decryption algorithm.

T

F

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A major advance in symmetric cryptography occurred with the

development of the rotor encryption/decryption machine.

T

F

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Public-key encryption is more secure from cryptanalysis than

symmetric encryption.

T

F

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Much of the theory of public-key cryptosystems is based on

number theory.

T

F

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Asymmetric algorithms rely on one key for encryption and a

different but related key for decryption.

T

F

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?