C3 Crypto & PKI Review
Quiz
•
Computers
•
9th - 12th Grade
•
Practice Problem
•
Medium
Melody Kelley
Used 6+ times
FREE Resource
Enhance your content in a minute
26 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which feature of cryptography is used to prove a user's identity and prevent an individual from fraudulently reneging on an action?
Confidentiality
Nonrepudiation
Obfuscation
Authentication
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which algorithm encrypts and decrypts data using the same key?
Hash algorithm
Symmetric cryptographic algorithm
Rivest-Shamir-Adleman algorithm
Asymmetric cryptographic algorithm
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a state of data, where data is transmitted across a network?
Data in processing
Data at rest
Data in transit
3DES
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
John receives an encrypted document using asymmetric cryptography from Alex. Which process should Alex use along with asymmetric cryptography so that John can be sure that the received document is real, from Alex, and unaltered?
Elliptic curve cryptography
Digital signature algorithm
Rivest-Shamir-Alderman
Symmetric cryptography
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which cryptographic method should Susanne use to ensure that a document can be encrypted with a key and decrypted with a different key?
Public
Ephemeral
Symmetric
Asymmetric
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack sees an attacker attempt to determine the hash function's input strings that produce the same hash result?
Known ciphertext attack
Downgrade attack
Collision attack
Birthday attack
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A new e-commerce startup with global operations is looking for a method to manage its supply-chain data for production. Instead of using bar codes, scanners, paper forms, and individual databases, making the system difficult to use, which method should be used to quickly track shipments?
File and file system cryptography
USB device encryption
Full disk encryption
Blockchain
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
25 questions
CS-9 Chapter-5 Computer Software Part3: Rabin Ghimire
Quiz
•
10th Grade
27 questions
Adobe Illustrator Quiz Review
Quiz
•
9th - 12th Grade
21 questions
Sets
Quiz
•
11th Grade
21 questions
CITY & GUILDS PROOF CORRECTION SIGNS
Quiz
•
10th - 12th Grade
23 questions
DDD2 Y10 19th July Networks
Quiz
•
10th Grade
22 questions
Computers
Quiz
•
12th Grade
25 questions
6. ICT Systems
Quiz
•
10th - 11th Grade
23 questions
Computing Literacy Lessons 1-5
Quiz
•
9th - 10th Grade
Popular Resources on Wayground
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
4:3 Model Multiplication of Decimals by Whole Numbers
Quiz
•
5th Grade
10 questions
The Best Christmas Pageant Ever Chapters 1 & 2
Quiz
•
4th Grade
12 questions
Unit 4 Review Day
Quiz
•
3rd Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
15 questions
Solving Equations with Variables on Both Sides Review
Quiz
•
8th Grade
Discover more resources for Computers
40 questions
Introduction to Microsoft Word
Quiz
•
8th - 12th Grade
85 questions
Word Processing Review
Quiz
•
8th - 9th Grade
11 questions
Internet Terms Vocabulary- Notebook Check #1- CTEA
Quiz
•
12th Grade
39 questions
UNIT 7 and UNIT 8 — Multiple Choice Question Bank (Extracted)
Quiz
•
9th Grade
31 questions
Python Conditionals Review
Quiz
•
9th - 12th Grade
