Introduction to Cryptography

Introduction to Cryptography

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Robin Rohit

Used 21+ times

FREE Resource

Student preview

quiz-placeholder

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which three protocols use asymmetric key algorithms? (Choose three.)

Secure Sockets Layer (SSL)

Secure File Transfer Protocol (SFTP)

Pretty Good Privacy (PGP)

Advanced Encryption Standard (AES)

Secure Shell (SSH)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange?

ECC

AES

IDEA

RSA

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which 128-bit block cipher encryption algorithm does the US government use to protect classified information?

Skipjack

Vignere

Caesar

AES

3DES

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term is used to describe concealing data in another file such as a graphic, audio, or other text file?

masking

obfuscation

steganography

hiding

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe the science of making and breaking secret codes?

impersonation

factorization

jamming

cryptology

spoofing

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which two terms are used to describe cipher keys? (Choose two.)

key space

keylogging

key length

key randomness

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cipher is able to encrypt a fixed-length block of plaintext into a 128-bit block of ciphertext at any one time?

transform

hash

block

stream

symmetric

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?