COMPTIA 02

COMPTIA 02

12th Grade

132 Qs

quiz-placeholder

Similar activities

Essential Computer Science terms

Essential Computer Science terms

12th Grade

131 Qs

Nhập môn tin học & E-Learning

Nhập môn tin học & E-Learning

12th Grade

135 Qs

Form 3 Revision

Form 3 Revision

12th Grade

135 Qs

Grade 12 CSS PreTest

Grade 12 CSS PreTest

12th Grade

130 Qs

E.Tech_BrainQuest_24-25

E.Tech_BrainQuest_24-25

12th Grade

130 Qs

YEAR 11 MOCK REVISION SUPER QUIZ FOR 26/02/2024

YEAR 11 MOCK REVISION SUPER QUIZ FOR 26/02/2024

12th Grade

131 Qs

Latihan soal !

Latihan soal !

12th Grade

132 Qs

5th Social and Economic Impacts of ICT

5th Social and Economic Impacts of ICT

9th - 12th Grade

128 Qs

COMPTIA 02

COMPTIA 02

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Isabel Aguilar

Used 2+ times

FREE Resource

132 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

is a symmetric key block cipher that operates on 128-bit blocks and supports key sizes of 128, 192, and 256 bits.

Serpent

AWS

IDEA

RC4

ChaCha20

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

is a symmetric key block cipher that operates on 128-bit blocks and supports key sizes of 128, 192, and 256 bits. It is a joint development by NTT and Mitsubishi Electric Corporation.

Serpent

Camellia

IDEA

RC4

ChaCha20

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

is a symmetric key block cipher that operates on 64-bit blocks and supports key sizes of 128 bits.

Serpent

Camellia

IDEA

RC4

ChaCha20

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

is a stream cipher known for its simplicity and speed. It operates on variable-length keys and generates a keystream that is XORed with the plaintext to produce the ciphertext.

Serpent

Camellia

IDEA

RC4

ChaCha20

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Is a stream cipher that is widely used in applications such as TLS. It operates on 512-bit blocks and supports key sizes of 128, 256 bits.

Serpent

Camellia

IDEA

RC4

ChaCha20

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

is one of the most widely used asymmetric encryption algorithms. It relies on the difficulty of factoring large prime numbers. The algorithm generates a public-private key pair, where the public key is used for encryption, and the private key is used for decryption. is often employed in secure email communication, SSL/TLS protocols, digital signatures, and key exchange.

RSA

Diffie-Hellman (DH)

Elliptic Curve Cryptography (ECC):

Digital Signature Algorithm (DSA):

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

is a key exchange algorithm that allows two parties to establish a shared secret key over an insecure communication channel. It enables secure communication even if an eavesdropper intercepts the exchange. is used in various protocols such as SSL/TLS, IPsec, and secure email.

RSA

Diffie-Hellman (DH)

Elliptic Curve Cryptography (ECC):

Digital Signature Algorithm (DSA):

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?