
Fundamentals of Cryptography Quiz
Authored by Darshankumar Chauhan
Computers
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes symmetric key cryptography?
Uses a pair of keys: one for encryption and one for decryption
Uses the same key for both encryption and decryption
Does not use any keys
Uses a public key for encryption and a private key for decryption
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which algorithm is commonly used for asymmetric key cryptography?
AES
DES
RSA
SHA-256
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main purpose of a hash function in cryptography?
To encrypt data
To compress data
To produce a fixed-size output from variable-length input
To generate public and private keys
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a property of a good cryptographic hash function?
Pre-image resistance
Collision resistance
Deterministic output
Easy to reverse
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In digital signatures, what is used to sign a message?
The sender's public key
The sender's private key
The receiver's public key
The receiver's private key
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a primary function of Public Key Infrastructure (PKI)?
Generating random numbers
Managing digital certificates
Compressing files
Encrypting hard drives
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which cryptographic protocol is commonly used to secure web traffic?
FTP
HTTP
SSL/TLS
SMTP
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?