cryptography

cryptography

Professional Development

25 Qs

quiz-placeholder

Similar activities

Quiz for Puducherry State Connect Programme

Quiz for Puducherry State Connect Programme

Professional Development

21 Qs

Kuis Manajemen Risiko dalam Keamanan Siber

Kuis Manajemen Risiko dalam Keamanan Siber

Professional Development

20 Qs

Kuis Kebijakan SPBE

Kuis Kebijakan SPBE

Professional Development

20 Qs

Quiz Pemrograman Web

Quiz Pemrograman Web

Professional Development

30 Qs

CB-Quiz On AWS_IAM USER

CB-Quiz On AWS_IAM USER

Professional Development

20 Qs

Chapter 10: Incident Detection and Analysis

Chapter 10: Incident Detection and Analysis

Professional Development

20 Qs

OSI Model and Networking Quiz

OSI Model and Networking Quiz

Professional Development

20 Qs

cryptography

cryptography

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

22DI03 D

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term "key exchange" mean in cryptography?

Sharing of encrypted data

Sharing of cryptographic keys between parties

Swapping public keys for private keys

Changing encryption algorithms during communication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following ensures confidentiality of a message?

Hashing

Encryption

Digital signatures

Salting

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In symmetric encryption, the same key is used for:

Encryption only

Decryption only

Both encryption and decryption

Key generation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a message authentication code (MAC)?

Encrypt data

Authenticate the sender and verify integrity

Create digital certificates

Generate random keys

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a primary characteristic of a one-way hash function?

It can be reversed to obtain the original data

It produces fixed-length output for variable-length input

It uses symmetric keys

It requires high computational power

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a characteristic of public-key cryptography?

Scalability

Secure key distribution

High speed

Asymmetry

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a weakness of symmetric key cryptography?

Key distribution

Complexity of the algorithm

Low speed

High storage requirements

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?