Lesson 3

Lesson 3

University

30 Qs

quiz-placeholder

Similar activities

Computer Security Quiz

Computer Security Quiz

University

35 Qs

Sistem Informasi ERD

Sistem Informasi ERD

University

35 Qs

Micro: Market Structures

Micro: Market Structures

University

35 Qs

Continent Project Review

Continent Project Review

KG - University

37 Qs

HPCN 21-09-23

HPCN 21-09-23

University

40 Qs

Cryptography Final Quiz

Cryptography Final Quiz

University

35 Qs

IT Act 2000

IT Act 2000

University

33 Qs

Privacy and Security Quiz

Privacy and Security Quiz

University

40 Qs

Lesson 3

Lesson 3

Assessment

Quiz

Other

University

Hard

Created by

Benjamin Fenton

Used 2+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the three fundamental categories of cryptographic functions?

Hashing algorithms, symmetric ciphers, and asymmetric ciphers

Digital certificates, digital signatures, and key escrow

Full-disk, volume, and file encryption

Transport Layer Security, IPsec, and WPA

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security property is provided only by symmetric encryption when two parties share the same secret key?

Authentication

Confidentiality

Non-repudiation

Perfect Forward Secrecy

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Advanced Encryption Standard (AES) with a 256-bit key has a keyspace of:

256 × 2 possible keys

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principal challenge of using symmetric cryptography between Alice and Bob over an untrusted network?

Secure key exchange

Excessive CPU overhead

Key length limitations

Inability to provide bulk encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement accurately describes a drawback of asymmetric encryption compared to symmetric encryption?

It is limited to 128-bit key lengths.

Its private key can be derived from the public key.

It cannot be used to distribute keys securely.

It requires substantially more processing power for bulk data.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A 256-bit ECC private key provides roughly the same security strength as which RSA key length?

3,072 bits

16,384 bits

1,024 bits

512 bits

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cryptographic function is specifically designed to be one-way and therefore supports integrity rather than confidentiality?

Elliptic Curve Diffie-Hellman

Hashing

Key escrow

Stream encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?