Encryption Theory_First Quiz 2022/2023

Encryption Theory_First Quiz 2022/2023

University

28 Qs

quiz-placeholder

Similar activities

Year 9 Computing Unit 1 Assessment - Cracking the code

Year 9 Computing Unit 1 Assessment - Cracking the code

7th Grade - University

30 Qs

икт 8

икт 8

University

25 Qs

Security+ SY0-401: Cryptography

Security+ SY0-401: Cryptography

KG - University

23 Qs

Cryptography

Cryptography

University

23 Qs

Cybersecurity Essentials Chapter 4 Review

Cybersecurity Essentials Chapter 4 Review

9th Grade - University

25 Qs

Cyber Security

Cyber Security

University

23 Qs

DTS & CG/SG

DTS & CG/SG

University

25 Qs

Cybersec 202011280611

Cybersec 202011280611

University

31 Qs

Encryption Theory_First Quiz 2022/2023

Encryption Theory_First Quiz 2022/2023

Assessment

Quiz

Computers

University

Medium

Created by

Abed Hussein

Used 15+ times

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An Asymmetric-key (or public-key) cipher uses

1- Key

2-Key

3-Key

4-Key

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In Cryptography, original message, before being transformed, is called

Simple Text

Plain Text

Cipher Text

Filled Text

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An encryption algorithm transforms plain text into

Cipher text

Simple Text

Empty Text

Plain Text

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In symmetric key cryptography, key used by sender and receiver is

two keys are used

private and public

shared

different

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Shift ciphers sometimes referred to as the

Julia cipher

plain cipher

Caesar cipher

All of them

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In asymmetric key cryptography, the private key is kept by

Sender

Receiver

Sender and Receiver

all the connected devices to the network

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In cryptography, the order of the letters in a message is rearranged by

transposition ciphers

substitution ciphers

substitution ciphers and transposition ciphers

none of the mentioned

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?