Introduction to Cryptography

Introduction to Cryptography

Assessment

Quiz

Computers

University

Medium

Created by

Robin Rohit

Used 21+ times

FREE Resource

Student preview

quiz-placeholder

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which three protocols use asymmetric key algorithms? (Choose three.)

Secure Sockets Layer (SSL)

Secure File Transfer Protocol (SFTP)

Pretty Good Privacy (PGP)

Advanced Encryption Standard (AES)

Secure Shell (SSH)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange?

ECC

AES

IDEA

RSA

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which 128-bit block cipher encryption algorithm does the US government use to protect classified information?

Skipjack

Vignere

Caesar

AES

3DES

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term is used to describe concealing data in another file such as a graphic, audio, or other text file?

masking

obfuscation

steganography

hiding

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe the science of making and breaking secret codes?

impersonation

factorization

jamming

cryptology

spoofing

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which two terms are used to describe cipher keys? (Choose two.)

key space

keylogging

key length

key randomness

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cipher is able to encrypt a fixed-length block of plaintext into a 128-bit block of ciphertext at any one time?

transform

hash

block

stream

symmetric

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?