C3 Crypto & PKI Review

C3 Crypto & PKI Review

9th - 12th Grade

26 Qs

quiz-placeholder

Similar activities

Year 10 Inkscape lesson 5 and 6 formative test

Year 10 Inkscape lesson 5 and 6 formative test

10th Grade

22 Qs

Pre Test

Pre Test

11th Grade

22 Qs

Visual Basic Assessment

Visual Basic Assessment

11th - 12th Grade

21 Qs

Boolean Logic Year 11

Boolean Logic Year 11

11th Grade

21 Qs

Data representation assessment Prep

Data representation assessment Prep

10th Grade

21 Qs

Artificial Intelligence

Artificial Intelligence

9th - 12th Grade

21 Qs

APCSA Unit 3 FQ

APCSA Unit 3 FQ

11th - 12th Grade

21 Qs

ULHAR EXCEL

ULHAR EXCEL

10th Grade

25 Qs

C3 Crypto & PKI Review

C3 Crypto & PKI Review

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Melody Kelley

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which feature of cryptography is used to prove a user's identity and prevent an individual from fraudulently reneging on an action?

Confidentiality

Nonrepudiation

Obfuscation

Authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which algorithm encrypts and decrypts data using the same key?

Hash algorithm

Symmetric cryptographic algorithm

Rivest-Shamir-Adleman algorithm

Asymmetric cryptographic algorithm

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a state of data, where data is transmitted across a network?

Data in processing

Data at rest

Data in transit

3DES

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

John receives an encrypted document using asymmetric cryptography from Alex. Which process should Alex use along with asymmetric cryptography so that John can be sure that the received document is real, from Alex, and unaltered?

Elliptic curve cryptography

Digital signature algorithm

Rivest-Shamir-Alderman

Symmetric cryptography

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cryptographic method should Susanne use to ensure that a document can be encrypted with a key and decrypted with a different key?

Public

Ephemeral

Symmetric

Asymmetric

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack sees an attacker attempt to determine the hash function's input strings that produce the same hash result?

Known ciphertext attack

Downgrade attack

Collision attack

Birthday attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A new e-commerce startup with global operations is looking for a method to manage its supply-chain data for production. Instead of using bar codes, scanners, paper forms, and individual databases, making the system difficult to use, which method should be used to quickly track shipments?

File and file system cryptography

USB device encryption

Full disk encryption

Blockchain

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?