Fundamentals of Cryptography Quiz

Fundamentals of Cryptography Quiz

Professional Development

20 Qs

quiz-placeholder

Similar activities

Internet Technologies(Quiz 3)

Internet Technologies(Quiz 3)

Professional Development

21 Qs

Security+ Study Guide-10 Understanding Cryptography and PKI

Security+ Study Guide-10 Understanding Cryptography and PKI

Professional Development

15 Qs

Cryptography Chap-1

Cryptography Chap-1

9th Grade - Professional Development

15 Qs

Microsoft Excel Basics

Microsoft Excel Basics

Professional Development

20 Qs

CNS_Final Quiz

CNS_Final Quiz

Professional Development

20 Qs

Cryptography

Cryptography

Professional Development

17 Qs

Chapter 7 Quiz

Chapter 7 Quiz

Professional Development

23 Qs

IS404 - SY2023

IS404 - SY2023

Professional Development

21 Qs

Fundamentals of Cryptography Quiz

Fundamentals of Cryptography Quiz

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Darshankumar Chauhan

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes symmetric key cryptography?

Uses a pair of keys: one for encryption and one for decryption

Uses the same key for both encryption and decryption

Does not use any keys

Uses a public key for encryption and a private key for decryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which algorithm is commonly used for asymmetric key cryptography?

AES

DES

RSA

SHA-256

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of a hash function in cryptography?

To encrypt data

To compress data

To produce a fixed-size output from variable-length input

To generate public and private keys

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a property of a good cryptographic hash function?

Pre-image resistance

Collision resistance

Deterministic output

Easy to reverse

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In digital signatures, what is used to sign a message?

The sender's public key

The sender's private key

The receiver's public key

The receiver's private key

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a primary function of Public Key Infrastructure (PKI)?

Generating random numbers

Managing digital certificates

Compressing files

Encrypting hard drives

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cryptographic protocol is commonly used to secure web traffic?

FTP

HTTP

SSL/TLS

SMTP

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?