Cryptography Quiz

Cryptography Quiz

Professional Development

20 Qs

quiz-placeholder

Similar activities

Quiz sobre Caracterización de Redes Locales

Quiz sobre Caracterización de Redes Locales

Professional Development

19 Qs

aula 02

aula 02

Professional Development

16 Qs

Java Collections Framework Quiz 1

Java Collections Framework Quiz 1

Professional Development

19 Qs

IT Support Formative Assessment Part 2

IT Support Formative Assessment Part 2

Professional Development

25 Qs

Automation test

Automation test

Professional Development

20 Qs

Sesi 3 MSD 2025 - Data & AI

Sesi 3 MSD 2025 - Data & AI

Professional Development

15 Qs

Quiz on Flip-Flops and Sequential Logic Design

Quiz on Flip-Flops and Sequential Logic Design

Professional Development

15 Qs

Quiz sobre Arquitetura de Computadores

Quiz sobre Arquitetura de Computadores

Professional Development

15 Qs

Cryptography Quiz

Cryptography Quiz

Assessment

Quiz

Information Technology (IT)

Professional Development

Easy

Created by

Daniel Belay

Used 3+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Brian computes the digest of a single sentence of text using a SHA-2 hash function. He then changes a single character of the sentence and computes the hash value again. Which one of the following statements is true about the new hash value?

The new hash value will be one character different from the old hash value.

The new hash value will share at least 50 percent of the characters of the old hash value.

The new hash value will be unchanged.

The new hash value will be completely different from the old hash value.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alan believes that an attacker is collecting information about the electricity consumption of a sensitive cryptographic device and using that information to compromise encrypted data. What type of attack does he suspect is taking place?

Brute-force

Side-channel

Known plaintext

Frequency analysis

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If Richard wants to send an encrypted message to Sue using a public key cryptosystem, which key does he use to encrypt the message?

Richard's public key

Richard's private key

Sue's public key

Sue's private key

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a 2,048-bit plaintext message were encrypted with the ElGamal public key cryptosystem, how long would the resulting ciphertext message be?

1,024 bits

2,048 bits

4,096 bits

8,192 bits

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Acme Widgets currently uses a 3,072-bit RSA encryption standard companywide. The company plans to convert from RSA to an elliptic curve cryptosystem. If the company wants to maintain the same cryptographic strength, what ECC key length should it use?

256 bits

512 bits

1,024 bits

2,048 bits

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

John wants to produce a message digest of a 2,048-byte message he plans to send to Mary. If he uses the SHA-2 hashing algorithm, what is a possible size for the message digest generated?

160 bits

512 bits

1,024 bits

2,048 bits

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After conducting a survey of encryption technologies used in her organization, Melissa suspects that some may be out of date and pose security risks. Which one of the following technologies is considered flawed and should no longer be used?

SHA-3

TLS 1.3

IPSec

SSL 3.0

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?