Search Header Logo

C3 Crypto & PKI Review

Authored by Melody Kelley

Computers

9th - 12th Grade

Used 6+ times

C3 Crypto & PKI Review
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which feature of cryptography is used to prove a user's identity and prevent an individual from fraudulently reneging on an action?

Confidentiality

Nonrepudiation

Obfuscation

Authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which algorithm encrypts and decrypts data using the same key?

Hash algorithm

Symmetric cryptographic algorithm

Rivest-Shamir-Adleman algorithm

Asymmetric cryptographic algorithm

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a state of data, where data is transmitted across a network?

Data in processing

Data at rest

Data in transit

3DES

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

John receives an encrypted document using asymmetric cryptography from Alex. Which process should Alex use along with asymmetric cryptography so that John can be sure that the received document is real, from Alex, and unaltered?

Elliptic curve cryptography

Digital signature algorithm

Rivest-Shamir-Alderman

Symmetric cryptography

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cryptographic method should Susanne use to ensure that a document can be encrypted with a key and decrypted with a different key?

Public

Ephemeral

Symmetric

Asymmetric

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack sees an attacker attempt to determine the hash function's input strings that produce the same hash result?

Known ciphertext attack

Downgrade attack

Collision attack

Birthday attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A new e-commerce startup with global operations is looking for a method to manage its supply-chain data for production. Instead of using bar codes, scanners, paper forms, and individual databases, making the system difficult to use, which method should be used to quickly track shipments?

File and file system cryptography

USB device encryption

Full disk encryption

Blockchain

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?