C3 Crypto & PKI Review

C3 Crypto & PKI Review

9th - 12th Grade

26 Qs

quiz-placeholder

Similar activities

CSCu_Data Encrypt

CSCu_Data Encrypt

9th - 12th Grade

25 Qs

MSC comp

MSC comp

12th Grade

26 Qs

IOT SECURITY 1st

IOT SECURITY 1st

12th Grade

21 Qs

Digital Citizenship

Digital Citizenship

9th - 12th Grade

26 Qs

AP CSP Cybersecurity and Global Impacts

AP CSP Cybersecurity and Global Impacts

9th - 12th Grade

26 Qs

Searching & sorting algorithms

Searching & sorting algorithms

10th - 12th Grade

21 Qs

Unit 11: Cybersecurity

Unit 11: Cybersecurity

10th - 12th Grade

22 Qs

Cybersecurity Essentials Chapter 4 Review

Cybersecurity Essentials Chapter 4 Review

9th Grade - University

25 Qs

C3 Crypto & PKI Review

C3 Crypto & PKI Review

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Melody Kelley

Used 6+ times

FREE Resource

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which feature of cryptography is used to prove a user's identity and prevent an individual from fraudulently reneging on an action?

Confidentiality

Nonrepudiation

Obfuscation

Authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which algorithm encrypts and decrypts data using the same key?

Hash algorithm

Symmetric cryptographic algorithm

Rivest-Shamir-Adleman algorithm

Asymmetric cryptographic algorithm

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a state of data, where data is transmitted across a network?

Data in processing

Data at rest

Data in transit

3DES

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

John receives an encrypted document using asymmetric cryptography from Alex. Which process should Alex use along with asymmetric cryptography so that John can be sure that the received document is real, from Alex, and unaltered?

Elliptic curve cryptography

Digital signature algorithm

Rivest-Shamir-Alderman

Symmetric cryptography

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cryptographic method should Susanne use to ensure that a document can be encrypted with a key and decrypted with a different key?

Public

Ephemeral

Symmetric

Asymmetric

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack sees an attacker attempt to determine the hash function's input strings that produce the same hash result?

Known ciphertext attack

Downgrade attack

Collision attack

Birthday attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A new e-commerce startup with global operations is looking for a method to manage its supply-chain data for production. Instead of using bar codes, scanners, paper forms, and individual databases, making the system difficult to use, which method should be used to quickly track shipments?

File and file system cryptography

USB device encryption

Full disk encryption

Blockchain

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?