
IAS QUIZ 9
Authored by Darwin Vargas
Computers
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Asymmetric encryption utilizes only a public key for encryption
and decryption.
T
F
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Asymmetric encryption can be used for confidentiality but not for
authentication.
T
F
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Plaintext is transformed into ciphertext using two keys and a
decryption algorithm.
T
F
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A major advance in symmetric cryptography occurred with the
development of the rotor encryption/decryption machine.
T
F
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Public-key encryption is more secure from cryptanalysis than
symmetric encryption.
T
F
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Much of the theory of public-key cryptosystems is based on
number theory.
T
F
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Asymmetric algorithms rely on one key for encryption and a
different but related key for decryption.
T
F
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?