Cryptography

Cryptography

University

15 Qs

quiz-placeholder

Similar activities

iGCSE Cryptography (2023 onwards)

iGCSE Cryptography (2023 onwards)

9th Grade - University

10 Qs

CNET151 Chapt 8 Encryption

CNET151 Chapt 8 Encryption

University

15 Qs

Chapter 6 (Fundamentals of Cybersecurity

Chapter 6 (Fundamentals of Cybersecurity

University

10 Qs

Cryptology Tools

Cryptology Tools

University

15 Qs

Cryptography Chap-1

Cryptography Chap-1

9th Grade - Professional Development

15 Qs

Cryptography Basics

Cryptography Basics

University

20 Qs

IAS 101 - Week 11 and 12 - Cryptography

IAS 101 - Week 11 and 12 - Cryptography

University

20 Qs

Cryptology

Cryptology

9th Grade - University

15 Qs

Cryptography

Cryptography

Assessment

Quiz

Computers

University

Medium

Created by

Hitesh Grewal

Used 123+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an important disadvantage of using a public key algorithm compared to a symmetric algorithm?

Asymmetric algorithm provides better access control.

Asymmetric algorithm is a faster process.

Asymmetric algorithm provides nonrepudiation of delivery.

Asymmetric algorithm is more difficult to implement.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When a user needs to provide message integrity, what options may be best?

Send a digital signature of the message to the recipient

Encrypt the message with a symmetric algorithm and send it

Encrypt the message with a private key so the recipient can decrypt with

the corresponding public key

Create a checksum, append it to the message, encrypt the message, then

send to recipient.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The two methods of encrypting data are?

Substitution and transposition

Block and stream

Symmetric and asymmetric

DES and AES

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cryptography supports all of the core principles of information security except

Availability

Confidentiality

Integrity

Authenticity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The only cipher system said to be unbreakable by brute force is

AES

DES

One-time pad

Triple DES

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data that is in an unencrypted form is referred to as which of the following?

plain text

crypt text

cleartext

simpletext

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which type of encryption is the same key used to encrypt and decrypt data?

public

asymmetric

symmetric

private

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?