Encryption

Encryption

University

9 Qs

quiz-placeholder

Similar activities

OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing

OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing

11th Grade - University

9 Qs

Croteau SY110 L18&19 AY25

Croteau SY110 L18&19 AY25

University

6 Qs

Ecommerce Security

Ecommerce Security

University

10 Qs

Unit 10 - Internet Security

Unit 10 - Internet Security

12th Grade - University

13 Qs

Blockchain Basics: Algorithms

Blockchain Basics: Algorithms

University - Professional Development

9 Qs

Chapter 9

Chapter 9

University

9 Qs

Encryption

Encryption

University

12 Qs

iGCSE Cryptography (2023 onwards)

iGCSE Cryptography (2023 onwards)

9th Grade - University

10 Qs

Encryption

Encryption

Assessment

Quiz

Computers

University

Hard

Created by

Nandini Vijay

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of encryption?

To make the message look more appealing

To increase the size of the message for storage purposes

To scramble the contents of a message so only specific people can read it

To speed up the transmission of messages

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many types of encryption are mentioned?

One

Two

Three

Four

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of encryption requires a passphrase to encrypt and decrypt a message?

Public key encryption

Asymmetric encryption

Symmetric encryption

RSA encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What problem does asymmetric encryption solve?

Securely sharing a passphrase

Speed of encryption

Improving the visual appeal of the encrypted message

Reducing the size of the encrypted message

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What analogy is used to explain asymmetric encryption?

A secret handshake

A mailbox

A hidden treasure

A locked diary

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which algorithm is mentioned as a popular and secure way to generate a keypair for asymmetric encryption?

SHA-256

RSA

AES

MD5

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can public keys be used for in asymmetric encryption?

Neither encrypting nor decrypting data

Decrypting data

Both encrypting and decrypting data

Encrypting data

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why can't messages encrypted with Bob's public key be decrypted by Alice?

Because Bob does not have Alice's private key

Because Alice does not have Bob's public key

Because Alice does not have Bob's private key

Because the encryption is symmetric

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a real-world application of asymmetric encryption?

Listening to music online

Visiting secure websites via HTTPS

Visiting insecure websites

Sending unencrypted emails