Hash Functions and Cryptography Quiz

Hash Functions and Cryptography Quiz

University

10 Qs

quiz-placeholder

Similar activities

Cybersecurity Fundamentals Week 5 Quiz

Cybersecurity Fundamentals Week 5 Quiz

KG - University

10 Qs

LESSON 6 CRYPTOGRAPHY

LESSON 6 CRYPTOGRAPHY

University

14 Qs

CLI Topic 5 - Basic Security

CLI Topic 5 - Basic Security

University

10 Qs

Database Management system

Database Management system

University

12 Qs

Chapter 2 Networking Standards

Chapter 2 Networking Standards

University

10 Qs

Week 9 - Big Data Streaming

Week 9 - Big Data Streaming

University

9 Qs

Chapter 6

Chapter 6

University

12 Qs

Cryptocurrencies, Blockchain

Cryptocurrencies, Blockchain

University

7 Qs

Hash Functions and Cryptography Quiz

Hash Functions and Cryptography Quiz

Assessment

Quiz

Computers

University

Easy

Created by

ABISHA D undefined

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a property of a good hash function?

It is reversible

It produces variable length output

It is deterministic and produces fixed-length output

It produces the same output for different inputs

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which key is used to encrypt data in asymmetric encryption for confidentiality?

Secret key

Private key

Public key

Session key

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of digital signatures?

Encrypt data

Verify the authenticity of the sender

Compress data

Hide the message from the recipient

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a distributed system, what ensures that all nodes agree on a shared state?

Hashing

Consensus mechanism

Load balancer

Time synchronization

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a disadvantage of centralized systems compared to distributed systems?

Lower latency

Easier maintenance

Single point of failure

Faster access control

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary role of a node in a peer-to-peer network?

Acts only as a client

Acts as both client and server

Routes traffic

Encrypts all messages

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which data structure is most commonly used for verifying transaction integrity in blockchains?

Binary tree

B-tree

Merkle tree

AVL tree

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?