Cryptography Part 2

Cryptography Part 2

University

25 Qs

quiz-placeholder

Similar activities

DSA (QUIZ 6) Hashing, Graphs, Advanced Graph Algorithms, and DP

DSA (QUIZ 6) Hashing, Graphs, Advanced Graph Algorithms, and DP

University

20 Qs

IT for Managers M1

IT for Managers M1

University

20 Qs

Digital Asset Review

Digital Asset Review

10th Grade - University

26 Qs

YEAR 7 MID-TERM  ASSESSMENT

YEAR 7 MID-TERM ASSESSMENT

7th Grade - University

20 Qs

Chapter 6: E-commerce & Social Informatics Quiz

Chapter 6: E-commerce & Social Informatics Quiz

University

20 Qs

IT ELECTIVES - ROBOTICS 1ST QUIZ

IT ELECTIVES - ROBOTICS 1ST QUIZ

University

20 Qs

Security Fundamental

Security Fundamental

University

20 Qs

Usable Encryption Quiz

Usable Encryption Quiz

University

20 Qs

Cryptography Part 2

Cryptography Part 2

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

ramil bautista

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is NOT a key property of a hash function?

Pre-Image Resistance

Second Pre-Image Resistance

Deterministic Collision Generation

Collision Resistance

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the output size of the SHA-256 hash function?

128-bit

160-bit

256-bit

512-bit

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which step in the digital signature process involves encrypting the hash with the private key?

Hash creation

Encryption of the hash

Decryption of the signature

Comparison of hashes

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which cryptographic application is used to validate document authenticity and integrity?

Hashing

Symmetric Encryption

Data Integrity Check

Digital Signatures

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Why is MD5 now considered insecure?

Large output size

Second Pre-Image resistance failure

Slow computation

Vulnerabilities

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which cryptographic technique allows computations on encrypted data?

Homomorphic Encryption

Quantum Cryptography

Blockchain Technology

File System Encryption

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which type of encryption encrypts files and folders on storage devices?

Backup Encryption

Cloud Storage Encryption

File System Encryption

Database Encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?