IGCSE 03 09 2024

IGCSE 03 09 2024

9th - 12th Grade

6 Qs

quiz-placeholder

Similar activities

Flujos en Java/Android

Flujos en Java/Android

12th Grade - University

10 Qs

XI TKJ Latihan SAS Genap

XI TKJ Latihan SAS Genap

11th Grade

10 Qs

Python-list,tuple,Dictionary

Python-list,tuple,Dictionary

11th - 12th Grade

7 Qs

Bảo mật mạng

Bảo mật mạng

11th Grade

10 Qs

MySQL

MySQL

12th Grade

10 Qs

BTEC DIT C3 B1 - Threats to Data

BTEC DIT C3 B1 - Threats to Data

11th Grade

11 Qs

Q4 M1 PRETEST

Q4 M1 PRETEST

10th Grade

10 Qs

Cloud Computing Test 1

Cloud Computing Test 1

10th Grade

10 Qs

IGCSE 03 09 2024

IGCSE 03 09 2024

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Ashish Upadhyay

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Read all the sentences below and select one sentence that best describes the keys used for asymmetric encryption.

All the keys that are used in asymmetric encryption are private.

An asymmetric encryption algorithm uses a pair of keys: a public key and a private key.

Three public keys are used when using asymmetric encryption.

Asymmetric and symmetric both are same

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption is

The process of applying an encryption algorithm to plaintext to produce ciphertext that cannot be understood (without decryption).

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  • Sentence 1: Asymmetric encryption uses keys.

  • Sentence 2: Asymmetric encryption uses more than public keys

Sentence 1 is correct

Sentence 2 is correct

Both the sentences are correct

Both the sentences are wrong

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Select the two statements about asymmetric encryption that are true.

The private key must be used to encrypt the message.

Asymmetric encryption uses the same key for encryption and decryption.

Asymmetric encryption uses two keys: a public key and a private key.

A message encrypted with a public key can only be decrypted by a related private key.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

The image describes the process of _____________

Encryption

Decryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

The following diagram describes the process of _______

Decryption

Encryption