Search Header Logo

Cybersecurity training - Cryptography 2

Authored by Mena Khalil

Computers

Professional Development

Used 24+ times

Cybersecurity training - Cryptography 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Please choose the algorithm that requires the least resources to encrypt/decrypt

AES

RSA

ECC

DSS

2.

REORDER QUESTION

1 min • 5 pts

Reorder the following steps of Deffie-Hellman Key Exchange process

calculate shared secret key

Generate a private key

Exchange public keys

calculate public key

Agree on prime and generator

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

the blowfish encryption requires public key exchange

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

you want to choose an algorithm to encrypt your data (at rest) with security and performance in mind

AES-ECB

AES-CBC

AES-CTR

RSA

DSS

5.

MATCH QUESTION

1 min • 5 pts

Match the following

symmetric encryption algorithm

HMAC

a stream cipher

chacha20

used to validate identity

RSA

asymmetric encryption algorithm

PKI

message authentication

blowfish

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Bob is sending Alice a message, what key does he need to sign the message

Bob's public

Bob's private

Alice's public

Alice's private

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Alice is sending Bob a message, what key does she need to encrypt the message

Bob's public

Bob's private

Alice's public

Alice's private

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?