Cryptography

Cryptography

University

10 Qs

quiz-placeholder

Similar activities

Cryptographic fundamentals for IoT

Cryptographic fundamentals for IoT

University

15 Qs

Chapter 9

Chapter 9

University

9 Qs

EC335 - Quiz 1

EC335 - Quiz 1

University

10 Qs

Cryptography

Cryptography

University

15 Qs

Unit 10 Cybersecurity CSP

Unit 10 Cybersecurity CSP

12th Grade - University

13 Qs

Ecommerce Security

Ecommerce Security

University

10 Qs

Encryption

Encryption

University

12 Qs

KEAMANAN KOMPUTER

KEAMANAN KOMPUTER

University

15 Qs

Cryptography

Cryptography

Assessment

Quiz

Computers

University

Medium

Created by

Subba Chavva

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes cryptography?

The process of storing data in multiple places for security

A technique for speeding up data transfer rates

A method for generating random numbers

The science of transforming information to prevent unauthorized access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Data Encryption Standard (DES) operates on which of the following block sizes?

32 bits

64 bits

128 bits

256 bits

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Advanced Encryption Standard (AES) uses which of the following key sizes?

92, 224, and 256 bits

64, 96, and 128 bits

128, 192, and 256 bits

56, 64, and 128 bits

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In RSA encryption, what are the two main keys involved in the process?

Symmetric and asymmetric keys

Public key and private key

Shared key and session key

Private key and secret key

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of firewall filters traffic based on IP addresses and ports?

Packet-filtering firewall

Proxy firewall

ext-generation firewall

Stateful inspection firewall

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements is true about symmetric-key cryptography?

It is primarily used for digital signatures.

It is slower than public-key cryptography for large datasets.

It requires a public and private key pair.

It is generally faster than public-key cryptography.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many rounds of encryption does the DES algorithm use?

8

16

12

10

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?