Cryptography

Cryptography

University

15 Qs

quiz-placeholder

Similar activities

Security

Security

12th Grade - University

12 Qs

Cryptography Chap-1

Cryptography Chap-1

9th Grade - Professional Development

15 Qs

Quiz-1 Classical Encryption Techniques

Quiz-1 Classical Encryption Techniques

University

14 Qs

Quiz No. 3 II-CINS PNetSec (final term)

Quiz No. 3 II-CINS PNetSec (final term)

University

15 Qs

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

University

10 Qs

Computer Security:Encryption

Computer Security:Encryption

10th Grade - University

10 Qs

Cryptographic fundamentals for IoT

Cryptographic fundamentals for IoT

University

15 Qs

EC335 - Quiz 1

EC335 - Quiz 1

University

10 Qs

Cryptography

Cryptography

Assessment

Quiz

Computers

University

Medium

Created by

Hitesh Grewal

Used 118+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an important disadvantage of using a public key algorithm compared to a symmetric algorithm?

Asymmetric algorithm provides better access control.

Asymmetric algorithm is a faster process.

Asymmetric algorithm provides nonrepudiation of delivery.

Asymmetric algorithm is more difficult to implement.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When a user needs to provide message integrity, what options may be best?

Send a digital signature of the message to the recipient

Encrypt the message with a symmetric algorithm and send it

Encrypt the message with a private key so the recipient can decrypt with

the corresponding public key

Create a checksum, append it to the message, encrypt the message, then

send to recipient.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The two methods of encrypting data are?

Substitution and transposition

Block and stream

Symmetric and asymmetric

DES and AES

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cryptography supports all of the core principles of information security except

Availability

Confidentiality

Integrity

Authenticity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The only cipher system said to be unbreakable by brute force is

AES

DES

One-time pad

Triple DES

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data that is in an unencrypted form is referred to as which of the following?

plain text

crypt text

cleartext

simpletext

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which type of encryption is the same key used to encrypt and decrypt data?

public

asymmetric

symmetric

private

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?