Encryption Theory_First Quiz 2022/2023

Encryption Theory_First Quiz 2022/2023

University

28 Qs

quiz-placeholder

Similar activities

Blockchain Workshop_2

Blockchain Workshop_2

University

25 Qs

Computer Science (1-9) Wired and Wireless networks

Computer Science (1-9) Wired and Wireless networks

University

26 Qs

Python for Cyber Security

Python for Cyber Security

University

25 Qs

IAS QUIZ 12

IAS QUIZ 12

University

25 Qs

EMTECH

EMTECH

11th Grade - University

30 Qs

cns unit -I full quiz

cns unit -I full quiz

University

30 Qs

2022 | ICTC0713 | NW2A | Final Term Exam

2022 | ICTC0713 | NW2A | Final Term Exam

University

30 Qs

Computer Networks - Session 1

Computer Networks - Session 1

University

30 Qs

Encryption Theory_First Quiz 2022/2023

Encryption Theory_First Quiz 2022/2023

Assessment

Quiz

Computers

University

Medium

Created by

Abed Hussein

Used 15+ times

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An Asymmetric-key (or public-key) cipher uses

1- Key

2-Key

3-Key

4-Key

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In Cryptography, original message, before being transformed, is called

Simple Text

Plain Text

Cipher Text

Filled Text

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An encryption algorithm transforms plain text into

Cipher text

Simple Text

Empty Text

Plain Text

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In symmetric key cryptography, key used by sender and receiver is

two keys are used

private and public

shared

different

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Shift ciphers sometimes referred to as the

Julia cipher

plain cipher

Caesar cipher

All of them

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In asymmetric key cryptography, the private key is kept by

Sender

Receiver

Sender and Receiver

all the connected devices to the network

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In cryptography, the order of the letters in a message is rearranged by

transposition ciphers

substitution ciphers

substitution ciphers and transposition ciphers

none of the mentioned

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?