CH3 security

CH3 security

University

7 Qs

quiz-placeholder

Similar activities

BSOA 1 Basic Typing Drill

BSOA 1 Basic Typing Drill

University

8 Qs

Firewall and Network Security Quiz

Firewall and Network Security Quiz

University

10 Qs

Linux Core Directories

Linux Core Directories

11th Grade - University

9 Qs

PROTECCION DE COPIAS DE SEGURIDAD

PROTECCION DE COPIAS DE SEGURIDAD

University

9 Qs

Encryption Modes Quiz

Encryption Modes Quiz

University

5 Qs

Ulangkaji PB Teori (Ujian 2) Set B

Ulangkaji PB Teori (Ujian 2) Set B

University

10 Qs

CSS222 Q01

CSS222 Q01

University

10 Qs

Mastering SQL Concepts

Mastering SQL Concepts

University

12 Qs

CH3 security

CH3 security

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Rodah Alkaabi

Used 2+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is symmetric encryption also known as?

  • A) Public-key encryption

  • B) Asymmetric encryption

  • C) Single-key encryption

D) Hash encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an ingredient in symmetric encryption?

Plaintext

  • Public key

Secret key

Ciphertext

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Feistel cipher structure primarily associated with?

AES

RSA

DES

MD5

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which algorithm is considered a variation of the Feistel network?

AES

DES

RC4

MD5

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What key length is NOT used in AES?

  • A) 128-bit

  • B) 192-bit

  • C) 256-bit

D) 512-bit

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following modes of operation is NOT part of symmetric encryption?

  • A) ECB

  • B) CBC

  • C) RSA

  • D) CTR

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the Initialization Vector (IV) in the Cipher Block Chaining (CBC) mode?

  • A) To encrypt plaintext

  • B) To generate the secret key

  • C) To ensure unique ciphertext for repeated plaintext blocks

  • D) To calculate hash values