Public Key Encryption

Public Key Encryption

12th Grade

10 Qs

quiz-placeholder

Similar activities

Unit 10 - Internet Security

Unit 10 - Internet Security

12th Grade - University

13 Qs

A level CIE Security

A level CIE Security

10th - 12th Grade

12 Qs

Vocabulary Review Unit 4

Vocabulary Review Unit 4

9th - 12th Grade

12 Qs

APCSP 2.1.1 - 2.1.3 Review

APCSP 2.1.1 - 2.1.3 Review

9th - 12th Grade

15 Qs

Encryption - AQA A Level Computer Science

Encryption - AQA A Level Computer Science

11th - 12th Grade

10 Qs

Microsoft Word Chapter 1

Microsoft Word Chapter 1

KG - University

15 Qs

PRETEST

PRETEST

12th Grade

15 Qs

Asymmetric encryption

Asymmetric encryption

12th Grade - University

10 Qs

Public Key Encryption

Public Key Encryption

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Ralph Ellis

Used 65+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Agnes is sending a secure message to Barry. Which key should she use to encrypt the message so that only Barry can decrypt it?

Agnes's Public Key

Agnes's Private Key

Barry's Public Key

Barry's Private Key

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Agnes is sending a secure message to Barry. Which key will Barry use to decrypt the message?

Agnes's Public Key

Agnes's Private Key

Barry's Public Key

Barry's Private Key

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many keys are used in asymmetric encryption?

2

1

0

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When creating a digital signature, which key is used to encrypt the message digest?

Sender's public key

Sender's private key

Receiver's public key

Receiver's private key

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How does the receiver of a message use the digital signature to verify that the message has not been tampered with?

Decrypt the signature with the sender's public key and compare with a hash of the received message

Decrypt the signature and unhash it to see if it is the same as the received message

Telephones the sender to request confirmation

Hash the encrypted digest of the received message using the private key of the sender's certification authority

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alfie's private key has been used to encrypt a message. Which key can be used to decrypt the message?

Alfie's public key

Alfie's private key

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption method using public and private keys

Symmetric

Asymmetric

Vernam

Enigma

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?