Security

Security

Assessment

Quiz

Created by

Susilawati Rahim

Computers

1st - 3rd Grade

3 plays

Medium

Student preview

quiz-placeholder

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

What is meant by the term cipher when used in cryptography?

an encryption or decryption algorithm

an encrypted message

a type of session key

a digital signature

text following an encryption algorithm

2.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

When carrying out asymmetric encryption, which of the following users would keep the

private key?

the sender

the receiver

both sender and receiver

all recipients of the message

none of the above

3.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

In cryptography, which of the following is the term used to describe the message before it

is encrypted?

simpletext

plaintext

notext

ciphertext

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is the biggest disadvantage of using symmetric encryption?

it is very complex and time consuming

it is rarely used any more

the value of the key reads the same in both directions

it only works on computers with older operating systems

there is a security problem when transmitting the secret key

5.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Which of the following is the correct name for a form of encryption in which both the

sender and the recipient use the same key to encrypt/decrypt?

symmetric key encryption

asymmetric key encryption

public key encryption

same key encryption

block cipher encryption

6.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Which of the following is involved in temporary key generation?

session keys

private key and certificate

public key and certificate

master keys

public keys

7.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Which of the following is a correct statement about PKIs?

they use private and public keys but not digital certificates

they use digital signatures and public keys

they are a combination of digital certificates, public key cryptography and CAs

they use asymmetric keys, hashing algorithms and certificate authorities

they are a combination of digests, hashing algorithms and asymmetric cryptographic

algorithms

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers