Session assessment

Session assessment

University

15 Qs

quiz-placeholder

Similar activities

07 - Map

07 - Map

University

15 Qs

iCIO Contribute - Binus University

iCIO Contribute - Binus University

University

10 Qs

ASK T3 2.1 Kriptografi dalam Keselamatan Data

ASK T3 2.1 Kriptografi dalam Keselamatan Data

University

15 Qs

UNIT IV Normalization

UNIT IV Normalization

University

20 Qs

Quiz on Misinformation and Bias

Quiz on Misinformation and Bias

10th Grade - University

18 Qs

DI (EM24) - Diseño de Contenidos (T8)

DI (EM24) - Diseño de Contenidos (T8)

University - Professional Development

20 Qs

The Internet

The Internet

University

20 Qs

BD 1 - SQL - geral

BD 1 - SQL - geral

University

20 Qs

Session assessment

Session assessment

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Mohammad Siddiqui

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following is/are cryptographic tool

GPG

PGP

BitLocker

TCP/IP

openSSL

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you list the available cryptographic algorithms on gpg tool

gpg --list-algo

gpg --version

gpg --algorithms

gpg --algo-lists

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between symmetric-key and public-key cryptography?

Symmetric-key cryptography is more secure than public-key cryptography.

Symmetric key cryptography is used in ecommerce while public-key cryptography is use din military communication

Symmetric key cryptography uses one key for both encryption and decryption while public-key cryptography use two different keys but mathematically related

Symmetric key cryptography is based on number theory while public-key cryptography is base don complex theory

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a core concept related to information security that is central to cryptography?

Data confidentiality

Data Integrity

Data Availability

Autehntication

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following is/are symmetric-key algorithm(s)?

Blowfish

DES

Diffie-Hellmann

MD5

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following is/are public-key algorithm(s)?

RSA

DES

El Gamal

DSA

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following is/are hashing algorithms?

MD4

DES

SHA-1

SHA-256

DSA

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?