220 CEH M20 Cryptography

220 CEH M20 Cryptography

University

5 Qs

quiz-placeholder

Similar activities

Assessment 1

Assessment 1

University

10 Qs

COMMUNICATION EQUIPMENT PART 2

COMMUNICATION EQUIPMENT PART 2

University

10 Qs

Introduction to AI in the Workplace

Introduction to AI in the Workplace

University

10 Qs

Cryptography Quiz

Cryptography Quiz

University

10 Qs

Cryptography Quiz

Cryptography Quiz

University

10 Qs

IT Quiz Bee 2025 - DIFFICULT

IT Quiz Bee 2025 - DIFFICULT

University

10 Qs

PART 7: NETWORK SECURITY

PART 7: NETWORK SECURITY

University

10 Qs

UNTIRTA I/O QUIZ WEEK 3

UNTIRTA I/O QUIZ WEEK 3

University

10 Qs

220 CEH M20 Cryptography

220 CEH M20 Cryptography

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Olivier Ligot

Used 2+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following algorithms is an example of symmetric encryption?

RSA

AES

ECC

DSA

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of hashing in cryptography?

Encrypt data for confidentiality

Generate encryption keys

Ensure data integrity

Authenticate users

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In blockchain technology, which cryptographic method is primarily used to ensure the immutability of data blocks?

Symmetric encryption

Hashing

Asymmetric encryption

Digital signatures

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of asymmetric encryption?

It uses a single key for both encryption and decryption

It is faster than symmetric encryption

It uses a public and a private key

It does not require key exchange

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does blockchain achieve trust and transparency in a distributed system?

By using centralized control

By encrypting all transactions

By using consensus mechanisms and cryptographic hashes

By avoiding cryptographic algorithms