Cybersecurity training - Cryptography 2

Cybersecurity training - Cryptography 2

Professional Development

13 Qs

quiz-placeholder

Similar activities

Blockchain Basics: Algorithm and Techniques

Blockchain Basics: Algorithm and Techniques

University - Professional Development

12 Qs

Blockchain Basics: Algorithms

Blockchain Basics: Algorithms

University - Professional Development

9 Qs

Sw Development

Sw Development

Professional Development

10 Qs

Cloud Computing

Cloud Computing

University - Professional Development

10 Qs

OSI Model - Network Layer

OSI Model - Network Layer

9th Grade - Professional Development

10 Qs

Microsoft Teams quiz

Microsoft Teams quiz

Professional Development

10 Qs

Fundamentals II. Final de módulo

Fundamentals II. Final de módulo

Professional Development

16 Qs

Linux Essentials Quiz 2

Linux Essentials Quiz 2

Professional Development

11 Qs

Cybersecurity training - Cryptography 2

Cybersecurity training - Cryptography 2

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Mena Khalil

Used 24+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Please choose the algorithm that requires the least resources to encrypt/decrypt

AES

RSA

ECC

DSS

2.

REORDER QUESTION

1 min • 5 pts

Reorder the following steps of Deffie-Hellman Key Exchange process

Agree on prime and generator

Generate a private key

calculate public key

Exchange public keys

calculate shared secret key

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

the blowfish encryption requires public key exchange

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

you want to choose an algorithm to encrypt your data (at rest) with security and performance in mind

AES-ECB

AES-CBC

AES-CTR

RSA

DSS

5.

MATCH QUESTION

1 min • 5 pts

Match the following

symmetric encryption algorithm

PKI

message authentication

HMAC

used to validate identity

RSA

asymmetric encryption algorithm

chacha20

a stream cipher

blowfish

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Bob is sending Alice a message, what key does he need to sign the message

Bob's public

Bob's private

Alice's public

Alice's private

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Alice is sending Bob a message, what key does she need to encrypt the message

Bob's public

Bob's private

Alice's public

Alice's private

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?