Level 5 - Crypto Quiz 1 of 2

Level 5 - Crypto Quiz 1 of 2

20 Qs

quiz-placeholder

Similar activities

Topic 10- Analysing International Opportunities BBDM3134 (1)

Topic 10- Analysing International Opportunities BBDM3134 (1)

University

15 Qs

Indiana Map Skills

Indiana Map Skills

4th Grade

20 Qs

U.S. Healthcare System and Public Health Quiz

U.S. Healthcare System and Public Health Quiz

10th Grade

20 Qs

701 - Quiz 03

701 - Quiz 03

KG - University

21 Qs

2024-2025 F4A First Term Quiz

2024-2025 F4A First Term Quiz

12th Grade

20 Qs

L4ASI6C43V7TFBU2

L4ASI6C43V7TFBU2

KG - University

20 Qs

Vocab Set #4: Unit 1 Scientific Concepts 4

Vocab Set #4: Unit 1 Scientific Concepts 4

KG - University

15 Qs

Tekie Pedagogy

Tekie Pedagogy

KG - University

17 Qs

Level 5 - Crypto Quiz 1 of 2

Level 5 - Crypto Quiz 1 of 2

Assessment

Quiz

others

Medium

Created by

Eric Jones

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the Caesar cipher, if the word "HELLO" is shifted three spaces to the right, what does it become?
A. "KHOOR"
B. "JGNNQ"
C. "DOLWW"
D. "HELLO"

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How are symmetric and asymmetric encryption methods different?
A. Symmetric encryption uses the same key to encrypt and decrypt data, whereas asymmetric encryption uses one key to encrypt and a different key to decrypt data.
B. Symmetric encryption uses one key to encrypt and a different key to decrypt data, whereas asymmetric encryption uses the same key to encrypt and decrypt data.
C. Symmetric encryption uses a single key for encryption only, while asymmetric encryption uses a single key for decryption only.
D. Symmetric encryption is more secure than asymmetric encryption.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements about hashing is NOT correct?
A. When a piece of data is run through a hashing algorithm, it always generates the same hash.
B. Hashing is used on data that does not need to be decrypted, such as a password.
C. A hash can easily be decrypted back to its original value.
D. If even one letter in a file has been altered, the resulting hash would be different.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the process of "salting the hash" involve?
A. Removing additional characters from a password before hashing it
B. Adding random characters to a password before hashing it
C. Increasing the complexity of a password after hashing it
D. Reducing the complexity of a password before hashing it

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main function of a digital signature?
A. Encrypting the data
B. Providing non-repudiation
C. Creating a secure connection
D. Hashing the data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the advantage of Elliptic Curve Cryptography (ECC) over other cryptography methods?
A. ECC is able to generate smaller keys that are more secure than most other methods.
B. ECC uses longer keys which makes it more secure.
C. ECC is the oldest method of cryptography.
D. ECC is the least CPU-intensive encryption method.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the main drawbacks of symmetric encryption?
A. It uses the same key to encrypt and decrypt data
B. It is easily hacked
C. The key must be shared before a user can decrypt a message
D. It is no longer in use

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?