Module 2 - 4th

Module 2 - 4th

University

8 Qs

quiz-placeholder

Similar activities

Chapter 9

Chapter 9

University

9 Qs

Module 2- 3rd Topic

Module 2- 3rd Topic

University

7 Qs

Encryption

Encryption

University

12 Qs

Cryptocurrency

Cryptocurrency

University

9 Qs

Final Keamanan Komputer / Sistem Keamanan Jaringan

Final Keamanan Komputer / Sistem Keamanan Jaringan

University

11 Qs

TAC3121-Quiz 6

TAC3121-Quiz 6

University

10 Qs

Assignment6

Assignment6

University

10 Qs

ITBP301_Chapter 03-04

ITBP301_Chapter 03-04

University

10 Qs

Module 2 - 4th

Module 2 - 4th

Assessment

Quiz

Computers

University

Medium

Created by

poornima poojar

Used 1+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Symmetric Cryptography is also called as

Shared Key Cruptogtography

Symmetric Key Cryptography

Secret Key Cryptography

None of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____ is a number that can be used only once in a cryptographic protocol.

Nonce

Sequence Number

Random Number

Fixed number

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Message Authentication Codes (MACs) are also called as _____

Keyless Hash Functions

Authentication Functions

Cryptographic Functions

Keyed Hash Functions

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In HMACs the sender signs a message using the MAC and the receiver verifies it using shared keys.

False

True

May be

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The applications of hash functions in Blockchain Technologies are.........

Merkle Trees

Patricia Trees

Distributed Hash Tables

All of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

.................. are encryption algorithms that apply encryption algorithm on a bit-by-bit basis.

Block ciphers

Stream Ciphers

HMACs

None of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Stream Ciphers are

  1. i. Synchronous

  2. ii. Asynchronous

  3. iii. Random

i only

ii only

i,ii,iii

i and ii only

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Block ciphers are built using a design strategy known as .............

Stream Cipher Design

Feistel Cipher

Asymmetric Encryption

Hash Function