Cybersecurity training - Cryptography 2

Cybersecurity training - Cryptography 2

Professional Development

13 Qs

quiz-placeholder

Similar activities

Inheritance

Inheritance

Professional Development

10 Qs

Klassen und Objekte

Klassen und Objekte

Professional Development

10 Qs

Malware - Adware

Malware - Adware

Professional Development

10 Qs

Business Intelligence Quiz - 1

Business Intelligence Quiz - 1

University - Professional Development

10 Qs

AZ-900 practice quiz 2

AZ-900 practice quiz 2

Professional Development

15 Qs

Quiz TLJ Kelas XII TKJ  (Tugas Diklat 7 Samisanov)

Quiz TLJ Kelas XII TKJ (Tugas Diklat 7 Samisanov)

Professional Development

15 Qs

GCE Level 1 Bootcamp Brain Break 2

GCE Level 1 Bootcamp Brain Break 2

Professional Development

10 Qs

Quiz Java héritage

Quiz Java héritage

Professional Development

10 Qs

Cybersecurity training - Cryptography 2

Cybersecurity training - Cryptography 2

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Mena Khalil

Used 24+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Please choose the algorithm that requires the least resources to encrypt/decrypt

AES

RSA

ECC

DSS

2.

REORDER QUESTION

1 min • 5 pts

Reorder the following steps of Deffie-Hellman Key Exchange process

Agree on prime and generator

Generate a private key

calculate public key

Exchange public keys

calculate shared secret key

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

the blowfish encryption requires public key exchange

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

you want to choose an algorithm to encrypt your data (at rest) with security and performance in mind

AES-ECB

AES-CBC

AES-CTR

RSA

DSS

5.

MATCH QUESTION

1 min • 5 pts

Match the following

asymmetric encryption algorithm

PKI

a stream cipher

chacha20

used to validate identity

blowfish

message authentication

RSA

symmetric encryption algorithm

HMAC

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Bob is sending Alice a message, what key does he need to sign the message

Bob's public

Bob's private

Alice's public

Alice's private

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Alice is sending Bob a message, what key does she need to encrypt the message

Bob's public

Bob's private

Alice's public

Alice's private

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?