
Cryptography Quiz
Quiz
•
Information Technology (IT)
•
Professional Development
•
Easy
Daniel Belay
Used 3+ times
FREE Resource
Enhance your content
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Brian computes the digest of a single sentence of text using a SHA-2 hash function. He then changes a single character of the sentence and computes the hash value again. Which one of the following statements is true about the new hash value?
The new hash value will be one character different from the old hash value.
The new hash value will share at least 50 percent of the characters of the old hash value.
The new hash value will be unchanged.
The new hash value will be completely different from the old hash value.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Alan believes that an attacker is collecting information about the electricity consumption of a sensitive cryptographic device and using that information to compromise encrypted data. What type of attack does he suspect is taking place?
Brute-force
Side-channel
Known plaintext
Frequency analysis
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If Richard wants to send an encrypted message to Sue using a public key cryptosystem, which key does he use to encrypt the message?
Richard's public key
Richard's private key
Sue's public key
Sue's private key
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If a 2,048-bit plaintext message were encrypted with the ElGamal public key cryptosystem, how long would the resulting ciphertext message be?
1,024 bits
2,048 bits
4,096 bits
8,192 bits
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Acme Widgets currently uses a 3,072-bit RSA encryption standard companywide. The company plans to convert from RSA to an elliptic curve cryptosystem. If the company wants to maintain the same cryptographic strength, what ECC key length should it use?
256 bits
512 bits
1,024 bits
2,048 bits
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
John wants to produce a message digest of a 2,048-byte message he plans to send to Mary. If he uses the SHA-2 hashing algorithm, what is a possible size for the message digest generated?
160 bits
512 bits
1,024 bits
2,048 bits
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
After conducting a survey of encryption technologies used in her organization, Melissa suspects that some may be out of date and pose security risks. Which one of the following technologies is considered flawed and should no longer be used?
SHA-3
TLS 1.3
IPSec
SSL 3.0
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
15 questions
Quiz on Software Development Concepts
Quiz
•
Professional Development
15 questions
Pre Quiz - Privileged Identity Management
Quiz
•
Professional Development
15 questions
SQL com Supabase
Quiz
•
Professional Development
15 questions
SENAI 2024 | REDES 6
Quiz
•
Professional Development
18 questions
Refresh your knowledge in DE
Quiz
•
Professional Development
20 questions
Mastering PowerBI Concepts
Quiz
•
Professional Development
20 questions
Topic 1 Question 161 to 180
Quiz
•
Professional Development
25 questions
Optimizing BigTable Performance
Quiz
•
Professional Development
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade