
Cybersecurity training - Cryptography 2
Authored by Mena Khalil
Computers
Professional Development
Used 24+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Please choose the algorithm that requires the least resources to encrypt/decrypt
AES
RSA
ECC
DSS
2.
REORDER QUESTION
1 min • 5 pts
Reorder the following steps of Deffie-Hellman Key Exchange process
Generate a private key
calculate shared secret key
Agree on prime and generator
Exchange public keys
calculate public key
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
the blowfish encryption requires public key exchange
True
False
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
you want to choose an algorithm to encrypt your data (at rest) with security and performance in mind
AES-ECB
AES-CBC
AES-CTR
RSA
DSS
5.
MATCH QUESTION
1 min • 5 pts
a stream cipher
HMAC
asymmetric encryption algorithm
PKI
symmetric encryption algorithm
RSA
message authentication
chacha20
used to validate identity
blowfish
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Bob is sending Alice a message, what key does he need to sign the message
Bob's public
Bob's private
Alice's public
Alice's private
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Alice is sending Bob a message, what key does she need to encrypt the message
Bob's public
Bob's private
Alice's public
Alice's private
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?