Cryptography Quiz

Cryptography Quiz

Professional Development

40 Qs

quiz-placeholder

Similar activities

Post Assessment Intune

Post Assessment Intune

Professional Development

38 Qs

Trader Joe's History Quiz

Trader Joe's History Quiz

Professional Development

40 Qs

ITIL 4 Mock Exam

ITIL 4 Mock Exam

Professional Development

40 Qs

Hackathon Behavioral and Technical Questions

Hackathon Behavioral and Technical Questions

Professional Development

45 Qs

PARCTICE GCE LEVEL 2 - PART 2

PARCTICE GCE LEVEL 2 - PART 2

Professional Development

39 Qs

ई–सृजन (उत्तराखंड) Chatbot QUIZ

ई–सृजन (उत्तराखंड) Chatbot QUIZ

Professional Development

42 Qs

e-srijan uttarakhand

e-srijan uttarakhand

Professional Development

42 Qs

Cryptography Quiz

Cryptography Quiz

Assessment

Quiz

Information Technology (IT)

Professional Development

Medium

Created by

Jae K

Used 8+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alec wants to send Becky an encrypted message using asymmetric encryption.

What does Alec encrypt the message with?

Alec's private key

Becky's private key

Alec's public key

Becky's public key

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Stella sends Priscilla an encrypted message using asymmetric keys.

Which key is used to verify Stella's message?

Stella's public key

Priscilla's public key

Stella's private key

Priscilla's private key

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which block cipher mode converts the block cipher into a self-synchronizing stream cipher?

CFB

OFB

EFB

CTR

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which block cipher mode converts the block cipher to a synchronous stream output?

CFB

OFB

ECB

CTR

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

In asymmetric encryption, which key is used to encrypt the data?

Private key

Symmetric key

Public key

Session key

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which type of encryption is the same key used to encrypt and decrypt data?

public

asymmetric

symmetric

private

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What alternative term can be used to describe asymmetric cryptographic algorithms?

public key cryptography

user key cryptography

private key cryptography

cipher-text cryptography

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?