Module 2 - 5th

Module 2 - 5th

University

8 Qs

quiz-placeholder

Similar activities

Blockchain Basics: Algorithm and Techniques

Blockchain Basics: Algorithm and Techniques

University - Professional Development

12 Qs

J277 - 1.6 -  Encryption Techniques

J277 - 1.6 - Encryption Techniques

10th Grade - University

5 Qs

Croteau SY110 L18&19 AY25

Croteau SY110 L18&19 AY25

University

6 Qs

Chapter 6 (Fundamentals of Cybersecurity

Chapter 6 (Fundamentals of Cybersecurity

University

10 Qs

8th module23

8th module23

University

13 Qs

Cybersecurity 1

Cybersecurity 1

5th Grade - University

12 Qs

Security and Encryption: Web Security

Security and Encryption: Web Security

University

7 Qs

Computer Security:Encryption

Computer Security:Encryption

10th Grade - University

10 Qs

Module 2 - 5th

Module 2 - 5th

Assessment

Quiz

Computers

University

Medium

Created by

poornima poojar

Used 1+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Various modes for Block Ciphers are

ECB

CBC

OFB

CTR

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which mode of operation, each block of plaintext is XORed with the previously encrypted block

Cipher Block Chaining

Electronic Code Book

Counter Mode

Output Feedback

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Nonce is used to produce key stream in ............ mode.

Electronic Code Book

Cipher Block Chaining

Counter Mode

None of the abov

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

....... is used to verify whether the message has been modified by unauthorized entity

ECB

MAC

Hash

None of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Different keys are used for encryption and decryption in........... cryptography.

Symmetric

Asymmetric

Both Symmetric and Asymmetric

Hash functions

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____ key is used for encryption in Asymmetric

Public

Private

Public and Private

No key is used

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

..... key is freely available and published by the ........ key owner

Private, Public

Public, Public

Public, Private

Private, Public

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Symmetric Key Encryption is faster than Asymmetric Encryption

True

False