
IT3182 Cryptology and Network Security Midterm Exam
Authored by Kevin Untalan
Information Technology (IT)
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company wants to ensure that only authorized users can access its internal communication. Which cryptographic objective does this scenario represent?
Authentication
Confidentiality
Non-repudiation
Integrity
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Alice sends Bob a message encrypted with Bob's public key. What type of encryption is used?
Symmetric
Asymmetric
Hashing
One-time pad
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hacker attempts to alter an online transaction. Which cryptographic property prevents this?
Confidentiality
Authentication
Integrity
Non-repudiation
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following encryption methods is considered insecure today?
AES
RSA
DES
ECC
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which algorithm is best suited for digital signatures due to its small key size and strong security?
AES
ECC
DES
Blowfish
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A banking application needs encryption that balances security and performance. Which algorithm is the best choice?
RSA
AES
MD5
SHA-1
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Caesar cipher is an example of which type of encryption?
Transposition
Hashing
Substitution
Asymmetric
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?