C3 Crypto & PKI Review

Quiz
•
Computers
•
9th - 12th Grade
•
Medium
Melody Kelley
Used 6+ times
FREE Resource
26 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which feature of cryptography is used to prove a user's identity and prevent an individual from fraudulently reneging on an action?
Confidentiality
Nonrepudiation
Obfuscation
Authentication
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which algorithm encrypts and decrypts data using the same key?
Hash algorithm
Symmetric cryptographic algorithm
Rivest-Shamir-Adleman algorithm
Asymmetric cryptographic algorithm
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a state of data, where data is transmitted across a network?
Data in processing
Data at rest
Data in transit
3DES
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
John receives an encrypted document using asymmetric cryptography from Alex. Which process should Alex use along with asymmetric cryptography so that John can be sure that the received document is real, from Alex, and unaltered?
Elliptic curve cryptography
Digital signature algorithm
Rivest-Shamir-Alderman
Symmetric cryptography
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which cryptographic method should Susanne use to ensure that a document can be encrypted with a key and decrypted with a different key?
Public
Ephemeral
Symmetric
Asymmetric
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack sees an attacker attempt to determine the hash function's input strings that produce the same hash result?
Known ciphertext attack
Downgrade attack
Collision attack
Birthday attack
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A new e-commerce startup with global operations is looking for a method to manage its supply-chain data for production. Instead of using bar codes, scanners, paper forms, and individual databases, making the system difficult to use, which method should be used to quickly track shipments?
File and file system cryptography
USB device encryption
Full disk encryption
Blockchain
Create a free account and access millions of resources
Similar Resources on Wayground
30 questions
CY1U14- Cryptography

Quiz
•
9th - 12th Grade
21 questions
Rob 2 Sem. 1 Study Guide

Quiz
•
9th Grade - University
25 questions
1.4 - Network security

Quiz
•
7th - 10th Grade
21 questions
Security & Authentication in ITGS

Quiz
•
10th - 12th Grade
25 questions
Social Engineering and Malware

Quiz
•
8th - 11th Grade
25 questions
14.5.4 - Web Server and Network Security Quiz

Quiz
•
10th Grade
25 questions
Cybersecurity Essentials Chapter 1 Review

Quiz
•
10th Grade - University
25 questions
System Software: GCSE 9-1

Quiz
•
9th Grade - University
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
10 questions
1.2 OSI & TCP IP Models Quiz

Quiz
•
10th Grade
20 questions
Digital Citizenship

Quiz
•
8th - 12th Grade
30 questions
Introduction to Computers

Quiz
•
8th - 9th Grade
35 questions
Computer Baseline Examination 2025-26

Quiz
•
9th - 12th Grade
13 questions
Problem Solving Process

Quiz
•
9th - 12th Grade
20 questions
Hardware vs. Software Quiz

Quiz
•
7th - 10th Grade
10 questions
Understanding Algorithms with Pseudocode and Flowcharts

Interactive video
•
9th - 12th Grade