Chapter 21.2 Cryptography

Chapter 21.2 Cryptography

12th Grade

15 Qs

quiz-placeholder

Similar activities

APCSP Cyber

APCSP Cyber

9th - 12th Grade

10 Qs

Cybersecurity 1

Cybersecurity 1

5th Grade - University

12 Qs

iGCSE Computer Science: Data Compression and Encryption

iGCSE Computer Science: Data Compression and Encryption

9th - 12th Grade

18 Qs

Cryptology

Cryptology

9th Grade - University

15 Qs

IBA Chapter 8B

IBA Chapter 8B

8th - 12th Grade

16 Qs

A level CS Unit 17 Security

A level CS Unit 17 Security

12th Grade

20 Qs

CSP 2.1.5 Secure Protocols

CSP 2.1.5 Secure Protocols

9th - 12th Grade

13 Qs

AP CSP Review

AP CSP Review

9th - 12th Grade

10 Qs

Chapter 21.2 Cryptography

Chapter 21.2 Cryptography

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Ann Watterson

Used 3+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption algorithm is considered a legacy algorithm and should be avoided?

AES

DES

RSA

3DES

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between asymmetric and symmetric encryption?

The type of data they encrypt

The way they use keys

The speed of encryption

The level of security

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the two types of cipher modes in symmetric encryption?

Block cipher and stream cipher

Public cipher and private cipher

Open cipher and closed cipher

Fast cipher and slow cipher

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption algorithm is based on the premise that each communicating party knows the pre-shared key?

Asymmetric encryption

Symmetric encryption

Public key infrastructure

Digital signature

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What infrastructure is associated with asymmetric encryption?

Public key infrastructure (PKI)

Private key infrastructure (PKI)

Digital infrastructure (DI)

Secure infrastructure (SI)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should be used to ensure more secure communications in symmetric encryption?

A shorter key

A longer key

A public key

A digital signature

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption algorithm offers combinations of 128-, 192-, or 256-bit keys?

DES

3DES

AES

SEAL

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?