Module 2 - 4th

Module 2 - 4th

University

8 Qs

quiz-placeholder

Similar activities

CYINS

CYINS

University

11 Qs

Week 10 - Cyber Attacks Exercise 2

Week 10 - Cyber Attacks Exercise 2

University

10 Qs

Cryptography Quiz

Cryptography Quiz

University

10 Qs

cryptography

cryptography

University

3 Qs

unit i ccs

unit i ccs

University

7 Qs

Cybersecurity Fundamentals Week 2 Quiz

Cybersecurity Fundamentals Week 2 Quiz

KG - University

10 Qs

U0. Dynamic Data Structures

U0. Dynamic Data Structures

University

12 Qs

6th March

6th March

University

10 Qs

Module 2 - 4th

Module 2 - 4th

Assessment

Quiz

Computers

University

Medium

Created by

poornima poojar

Used 1+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Symmetric Cryptography is also called as

Shared Key Cruptogtography

Symmetric Key Cryptography

Secret Key Cryptography

None of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____ is a number that can be used only once in a cryptographic protocol.

Nonce

Sequence Number

Random Number

Fixed number

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Message Authentication Codes (MACs) are also called as _____

Keyless Hash Functions

Authentication Functions

Cryptographic Functions

Keyed Hash Functions

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In HMACs the sender signs a message using the MAC and the receiver verifies it using shared keys.

False

True

May be

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The applications of hash functions in Blockchain Technologies are.........

Merkle Trees

Patricia Trees

Distributed Hash Tables

All of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

.................. are encryption algorithms that apply encryption algorithm on a bit-by-bit basis.

Block ciphers

Stream Ciphers

HMACs

None of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Stream Ciphers are

  1. i. Synchronous

  2. ii. Asynchronous

  3. iii. Random

i only

ii only

i,ii,iii

i and ii only

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Block ciphers are built using a design strategy known as .............

Stream Cipher Design

Feistel Cipher

Asymmetric Encryption

Hash Function