Chapter 4 Cryptography

Chapter 4 Cryptography

University

8 Qs

quiz-placeholder

Similar activities

Effective Communication

Effective Communication

University

10 Qs

FOCOM C1

FOCOM C1

University - Professional Development

12 Qs

CNS-2nd QUIZ

CNS-2nd QUIZ

University

10 Qs

MGMT 107 Mini Quiz

MGMT 107 Mini Quiz

University

10 Qs

Computational Thinking for Problem Solving

Computational Thinking for Problem Solving

University

12 Qs

Teamwork and Leadership Quiz

Teamwork and Leadership Quiz

University

8 Qs

Blockchain Basics: Algorithms

Blockchain Basics: Algorithms

University - Professional Development

9 Qs

MS Word Review

MS Word Review

9th Grade - Professional Development

10 Qs

Chapter 4 Cryptography

Chapter 4 Cryptography

Assessment

Quiz

Professional Development

University

Hard

Created by

Ryan Age

Used 1+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a ciphertext?

Used for encryption and decryption.

Transformation of plaintext.

Cleartext message sent by sender to recipient.

Encrypted message.

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following are the 2 different types of encryption algorithm?

Asymmetric algorithm

Secret Key algorithm

Symmetric algorithm

One Way Hash

algorithm

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is NOT a characteristic of Symmetric algorithm?

Also known as Secret Key Algorithm.

Sender and recipient need to share a common secret key.

Public key Algorithm.

Uses the same key (symmetric/secret key) for encryption and decryption.

4.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which of the following are the issues of using a symmetric algorithm?

(Choose all that applies)

Need shared key

Need to exchange secret key

Sender and recipient may not know each other

Sender and recipient know each other

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

What are the 2 factors that affect the security of encrypted data?

Strength of cryptographic algorithms.

Distance between sender and receiver.

Secrecy .

6.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which of the following are the characteristics of asymmetric algorithm?

Public Key Algorithm.

Single Key Algorithm.

Public and private keys are mathematically related.

Private key – known only to the owner and cannot be derived from encryption key.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a problem of asymmetric algorithm?

Distance is too far.

Sender and recipient may not know each other.

is typically slower (~1000 times) than symmetric algorithm.

Both sender and recipient will have the same secret key for symmetric cryptography operations.

8.

MULTIPLE SELECT QUESTION

1 min • 1 pt

What are the functions of the Digital Signature?

(Choose all that applies).

Confidentiality.

Authenticity.

Integrity.

Non-repudiation.