
Introduction to Cryptography
Authored by Robin Rohit
Computers
University
Used 21+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which three protocols use asymmetric key algorithms? (Choose three.)
Secure Sockets Layer (SSL)
Secure File Transfer Protocol (SFTP)
Pretty Good Privacy (PGP)
Advanced Encryption Standard (AES)
Secure Shell (SSH)
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange?
ECC
AES
IDEA
RSA
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which 128-bit block cipher encryption algorithm does the US government use to protect classified information?
Skipjack
Vignere
Caesar
AES
3DES
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term is used to describe concealing data in another file such as a graphic, audio, or other text file?
masking
obfuscation
steganography
hiding
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term used to describe the science of making and breaking secret codes?
impersonation
factorization
jamming
cryptology
spoofing
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which two terms are used to describe cipher keys? (Choose two.)
key space
keylogging
key length
key randomness
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of cipher is able to encrypt a fixed-length block of plaintext into a 128-bit block of ciphertext at any one time?
transform
hash
block
stream
symmetric
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?