CRYPTOGRAPHY

CRYPTOGRAPHY

University

10 Qs

quiz-placeholder

Similar activities

quiz

quiz

University

10 Qs

Exploring Search Algorithms

Exploring Search Algorithms

University

15 Qs

AI & Data Science Quiz

AI & Data Science Quiz

University

15 Qs

A/D Converters

A/D Converters

University

10 Qs

Quiz on Language Modeling and PoS Tagging

Quiz on Language Modeling and PoS Tagging

University

11 Qs

FLAT Quiz

FLAT Quiz

University

15 Qs

NLP Module 2.1

NLP Module 2.1

University

10 Qs

Quiz

Quiz

University

5 Qs

CRYPTOGRAPHY

CRYPTOGRAPHY

Assessment

Quiz

Engineering

University

Medium

Created by

Saranya K

Used 21+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cryptography, what is cipher?

algorithm for performing encryption and decryption

encrypted message

both algorithm for performing encryption and decryption and encrypted message

decrypted message

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In asymmetric key cryptography, the private key is kept by __________

sender

receiver

sender and receiver

all the connected devices to the network

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following algorithm is not used in asymmetric-key cryptography?

rsa algorithm

diffie-hellman algorithm

electronic code book algorithm

dsa algorithm

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cryptography, the order of the letters in a message is rearranged by __________

transpositional ciphers

substitution ciphers

both transpositional ciphers and substitution ciphers

quadratic ciphers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is data encryption standard (DES)?

block cipher

stream cipher

bit cipher

byte cipher

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cryptanalysis is used __________

to find some insecurity in a cryptographic scheme

to increase the speed

to encrypt the data

to make new ciphers

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is a cryptographic protocol used to secure HTTP connection?

stream control transmission protocol (SCTP)

transport layer security (TLS)

explicit congestion notification (ECN)

resource reservation protocol

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?