
Cyber Security
Authored by Judgi Nagarajan
Computers
University
Used 40+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
23 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
1. In an asymmetric -key cipher, the sender uses the …………….key
Private
Public
none of the above
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
In an asymmetric -key cipher, the receiver uses the …………….key
Private
Public
none of the above
3.
FILL IN THE BLANKS QUESTION
45 sec • 1 pt
1. One commonly used public-key cryptography method is the …………………….algorithm
(a)
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
In public key cryptosystem which is kept as public?
Encryption keys
Decryption keys
Encryption and Decryption keys
None of the above
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A cryptographic hash function has variable output length.
True
False
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
........................... is a famous technological medium for the spread of malware,facing problems of spam, & phishing attacks.
Cloud
Website
Pen drive
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
In RSA, Ф(n) = in terms of p and q
(p)/(q)
(p)(q)
(p-1)(q-1)
(p+1)(q+1)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?