Module 2- 3rd Topic

Module 2- 3rd Topic

University

7 Qs

quiz-placeholder

Similar activities

CC 04 - Quiz 1

CC 04 - Quiz 1

University

10 Qs

QUIZ 7 PBO

QUIZ 7 PBO

University

10 Qs

Quiz No. 2.2 Hash Tables

Quiz No. 2.2 Hash Tables

University

12 Qs

Cybersecurity- Hashing

Cybersecurity- Hashing

University

7 Qs

CNS-Quiz

CNS-Quiz

University

10 Qs

Estándares de Criptografía de Llaves Públicas

Estándares de Criptografía de Llaves Públicas

University

8 Qs

ITBP301_Chapter 02

ITBP301_Chapter 02

University

10 Qs

Computer Science Password Hashing

Computer Science Password Hashing

University

10 Qs

Module 2- 3rd Topic

Module 2- 3rd Topic

Assessment

Quiz

Computers

University

Medium

Created by

poornima poojar

Used 2+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cryptography is the science of making information ____ in the presence of adversaries.

Compress

flexible

Secure

Trustable

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of converting Plaintext to Cipher text is called ___________

Decryption

Cryptography

Hash

Encryption

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Following are security properties of Hash Functions.

Pre-image Resistance

Second Pre-image Resistance

Third Pre-image Resistance

Collision Resistance

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

MD5 is a __ bit hash function that is commonly used for file integrity checks.

128

256

512

1024

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

SHA -0 is introduced by the _____

NSA (National Security Agency)

NIST (National Institute of Standards and Technology)

ISO (International Organization for Standardization)

IEEE (Institute of Electrical and Electronics Engineers)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

RIPEMD is the acronym for

Reduced Instruction Processor for Encryption and Message Digests

Reliable Information Processing for Efficient Message Digests

Race Integrity Primitives Evaluation Message Digest

Robust International Protocol for Enhanced Message Digests

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

SHA-256 algorithm works in ___ steps

8

9

10

11