
Security & Cryptography Surprise Tes
Authored by Krishnendu Rarhi
Computers
12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
What is symmetric key cryptography?
It requires a public key for encryption.
It uses different keys for encryption and decryption.
It is only used for digital signatures.
Symmetric key cryptography uses the same key for encryption and decryption.
Answer explanation
Symmetric key cryptography is defined by the use of the same key for both encryption and decryption, making it distinct from asymmetric methods that use a public and a private key.
2.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Name one advantage of symmetric key cryptography.
Slower processing speed for large data.
Requires more computational resources than asymmetric cryptography.
Increased complexity in key management.
Efficiency in processing large data.
Answer explanation
One advantage of symmetric key cryptography is its efficiency in processing large data, as it typically requires less computational power compared to asymmetric cryptography, making it faster for encrypting and decrypting large volumes of information.
3.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
What is the main disadvantage of symmetric key cryptography?
Inability to encrypt large data sets.
High computational overhead.
Lack of authentication mechanisms.
Key distribution and management challenges.
Answer explanation
The main disadvantage of symmetric key cryptography is key distribution and management challenges. As the number of users increases, securely sharing and managing keys becomes complex and poses significant risks.
4.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Define asymmetric key cryptography.
Asymmetric key cryptography uses a single key for both encryption and decryption.
Asymmetric key cryptography is a method that relies solely on symmetric keys.
Asymmetric key cryptography is a technique that does not involve any keys for securing data.
Asymmetric key cryptography is a method of encryption that uses a pair of keys, one public and one private, to secure data.
Answer explanation
Asymmetric key cryptography uses a pair of keys: a public key for encryption and a private key for decryption, ensuring secure data transmission. The other options incorrectly describe symmetric key methods or no key usage.
5.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
How does public key cryptography enhance security?
It uses a pair of keys for secure encryption and decryption, ensuring only intended recipients can access the information.
It encrypts data using a simple password for access.
It uses physical tokens to secure data transmission.
It relies on a single key for both encryption and decryption.
Answer explanation
Public key cryptography enhances security by using a pair of keys: a public key for encryption and a private key for decryption. This ensures that only the intended recipient, who possesses the private key, can access the information.
6.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
What is a hash function used for in cryptography?
To generate random passwords for users.
To ensure data integrity and authenticity by producing a unique fixed-size output for input data.
To compress data for faster storage.
To encrypt data for secure transmission.
Answer explanation
A hash function in cryptography ensures data integrity and authenticity by producing a unique fixed-size output for any input data. This allows verification of data without revealing the original content.
7.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Explain the properties of a good hash function.
A good hash function must produce the same output for different inputs.
A good hash function should be slow to compute for security.
A good hash function is deterministic, fast, collision-resistant, irreversible, and exhibits the avalanche effect.
A good hash function is always reversible and predictable.
Answer explanation
A good hash function is deterministic (same input yields same output), fast to compute, collision-resistant (different inputs produce different outputs), irreversible (cannot retrieve input from output), and exhibits the avalanche effect (small input changes cause drastic output changes).
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
python basics
Quiz
•
11th Grade - University
15 questions
CIW
Quiz
•
9th - 12th Grade
20 questions
Microsoft Excel
Quiz
•
KG - Professional Dev...
20 questions
Siskomdig Harian
Quiz
•
12th Grade
20 questions
LATIHAN SIMDIG
Quiz
•
9th - 12th Grade
16 questions
A2 Computer Science 4.10 Databases
Quiz
•
10th - 12th Grade
15 questions
Digital Etiquette
Quiz
•
4th Grade - University
15 questions
Quiz - Pengenalan Sistem Operasi
Quiz
•
12th Grade
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
18 questions
Valentines Day Trivia
Quiz
•
3rd Grade - University
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
21 questions
Presidents Day Trivia
Quiz
•
6th - 12th Grade
10 questions
Valentine's Day: History and Modern Celebration
Interactive video
•
9th - 12th Grade
11 questions
Valentine's Day Trivia
Quiz
•
8th - 12th Grade
10 questions
Factor Quadratic Expressions with Various Coefficients
Quiz
•
9th - 12th Grade
18 questions
Success Strategies
Quiz
•
9th - 12th Grade
10 questions
Valentine's Day Trivia
Quiz
•
9th - 12th Grade