Cryptography Basics

Cryptography Basics

12th Grade

10 Qs

quiz-placeholder

Similar activities

Computer Science Review

Computer Science Review

9th - 12th Grade

10 Qs

Cryptography

Cryptography

9th - 12th Grade

5 Qs

Encryption

Encryption

9th - 12th Grade

7 Qs

CSP 2.1.5 Secure Protocols

CSP 2.1.5 Secure Protocols

10th - 12th Grade

12 Qs

Cryptography AP CSP

Cryptography AP CSP

9th - 12th Grade

15 Qs

J277 Utility Software (Encryption & Defragmentation)

J277 Utility Software (Encryption & Defragmentation)

10th - 12th Grade

10 Qs

Quantum Computing

Quantum Computing

8th Grade - University

10 Qs

Unit 4 Big Data

Unit 4 Big Data

10th - 12th Grade

11 Qs

Cryptography Basics

Cryptography Basics

Assessment

Quiz

Computers

12th Grade

Easy

Created by

tony Claudio

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is cryptography?

Cryptography is the practice of baking pastries

Cryptography is the practice and study of techniques for secure communication in the presence of third parties.

Cryptography is the study of marine biology

Cryptography is the art of making pottery

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain the difference between encryption and decryption.

Encryption converts plaintext to ciphertext, while decryption converts ciphertext to plaintext.

Encryption is used for compressing data, while decryption is used for decompressing data.

Encryption converts ciphertext to plaintext, while decryption converts plaintext to ciphertext.

Encryption and decryption are the same process.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key in cryptography?

A key in cryptography is a musical instrument

A key in cryptography is a piece of information used to encrypt or decrypt data.

A key in cryptography is a mode of transportation

A key in cryptography is a type of food

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Describe the difference between symmetric and asymmetric encryption.

Symmetric encryption is only used for data at rest, while asymmetric encryption is used for data in transit.

Symmetric encryption uses different keys for encryption and decryption, while asymmetric encryption uses the same key for both.

Symmetric encryption is more secure than asymmetric encryption.

The main difference is in the number of keys used and their roles in the encryption process.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Caesar cipher and how does it work?

A Caesar cipher is a type of transposition cipher where letters are rearranged in a specific pattern.

A Caesar cipher is a type of steganography technique involving image manipulation.

A Caesar cipher is a type of substitution cipher where each letter in the plaintext is shifted a certain number of places down or up the alphabet.

A Caesar cipher is a type of encryption that uses quantum computing principles.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a substitution cipher?

A substitution cipher is a method of encryption where each letter in the plaintext is replaced with another letter according to a fixed system.

A substitution cipher is a method of encoding where each letter in the plaintext is shifted by a fixed number of positions in the alphabet.

A substitution cipher is a method of encryption where numbers are replaced with letters according to a fixed system.

A substitution cipher is a method of decryption where each letter in the plaintext is replaced with another letter according to a fixed system.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain the concept of a public key in asymmetric encryption.

A public key is only used for decryption

A public key in asymmetric encryption is used to encrypt data that can only be decrypted by the corresponding private key.

A public key is used for symmetric encryption

A public key is shared with everyone in private

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?