Cryptography

Cryptography

University

15 Qs

quiz-placeholder

Similar activities

CNS Module 1 TE 5 &6

CNS Module 1 TE 5 &6

University

10 Qs

CNS Quiz CA1 Set B

CNS Quiz CA1 Set B

University

15 Qs

FIT1047 week 11

FIT1047 week 11

University

13 Qs

Unit 10 Cybersecurity CSP

Unit 10 Cybersecurity CSP

12th Grade - University

13 Qs

ITBP301_Chapter 03-04

ITBP301_Chapter 03-04

University

10 Qs

I8CSE383T

I8CSE383T

University

10 Qs

Network Security Quiz

Network Security Quiz

University

10 Qs

H466 - 1.3.1 - Understanding Encryption Methods

H466 - 1.3.1 - Understanding Encryption Methods

12th Grade - University

15 Qs

Cryptography

Cryptography

Assessment

Quiz

Computers

University

Medium

Created by

Hitesh Grewal

Used 124+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an important disadvantage of using a public key algorithm compared to a symmetric algorithm?

Asymmetric algorithm provides better access control.

Asymmetric algorithm is a faster process.

Asymmetric algorithm provides nonrepudiation of delivery.

Asymmetric algorithm is more difficult to implement.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When a user needs to provide message integrity, what options may be best?

Send a digital signature of the message to the recipient

Encrypt the message with a symmetric algorithm and send it

Encrypt the message with a private key so the recipient can decrypt with

the corresponding public key

Create a checksum, append it to the message, encrypt the message, then

send to recipient.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The two methods of encrypting data are?

Substitution and transposition

Block and stream

Symmetric and asymmetric

DES and AES

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cryptography supports all of the core principles of information security except

Availability

Confidentiality

Integrity

Authenticity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The only cipher system said to be unbreakable by brute force is

AES

DES

One-time pad

Triple DES

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data that is in an unencrypted form is referred to as which of the following?

plain text

crypt text

cleartext

simpletext

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which type of encryption is the same key used to encrypt and decrypt data?

public

asymmetric

symmetric

private

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?