Unit 2: Cryptography

Unit 2: Cryptography

University

20 Qs

quiz-placeholder

Similar activities

Embedded Security Quiz No 4

Embedded Security Quiz No 4

University

15 Qs

PRETEST (Music 6)

PRETEST (Music 6)

6th Grade - University

15 Qs

Moini Ch12 Computers

Moini Ch12 Computers

11th Grade - Professional Development

24 Qs

WN quiz

WN quiz

University

17 Qs

Information Systems Quiz

Information Systems Quiz

University

20 Qs

DATABASE LEVEL 1

DATABASE LEVEL 1

University

15 Qs

2311-Pret vs Imp

2311-Pret vs Imp

University

18 Qs

Unit 2: Cryptography

Unit 2: Cryptography

Assessment

Quiz

Other

University

Medium

Created by

Nathaniel Referente

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of cryptography?

To speed up computers

To protect information

To compress files

To organize data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of encryption uses the same key for both encryption and decryption?

Asymmetric Encryption

Symmetric Encryption

Hashing

Digital Signatures

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a simple example of symmetric encryption?

Using the same lock and key for a safe

Using two different keys for a safe

Checking a document's integrity

Verifying a digital signature

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of encryption uses two keys - a public key and a private key?

Symmetric Encryption

Asymmetric Encryption

Hashing

Data Compression

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a hash function do?

Encrypts data

Converts data into a fixed-size string

Creates digital signatures

Manages cryptographic keys

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is used to verify the authenticity of a message?

Hash Function

Encryption

Digital Signature

Key Management

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary use of a digital signature?

To compress files

To verify the authenticity of a message

To encrypt data

To hash passwords

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?