An (a) is a another name for a hacker that maliciously reads data sent over a (b) network.

Cryptography A Levels

Quiz
•
Computers
•
9th - 12th Grade
•
Easy
Ryan Coughlin
Used 1+ times
FREE Resource
44 questions
Show all answers
1.
DRAG AND DROP QUESTION
1 min • 1 pt
2.
DRAG AND DROP QUESTION
1 min • 1 pt
(a) is where only the intended recipient should be able to read or decipher the data.
(b) is the need to identify who sent the data and verify that the source is legitimate.
(c) is that data should reach its destination without any changes.
(d) is that neither the sender nor the recipient should be able to deny that they were part of the data transmission which just took place.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which is more secure, block cipher or stream cipher?
block cipher
stream cipher
4.
OPEN ENDED QUESTION
3 mins • 1 pt
Why is a block cipher more secure than a stream cipher?
Evaluate responses using AI:
OFF
Answer explanation
A block cipher is more secure than a stream cipher because it is more difficult to break. A stream cipher encrypts data in a continuous fashion, which makes it easier to decrypt. However, a block cipher encrypts data into blocks, which makes it more difficult to decrypt.
With block cipher, each plaintext block is XORed with the previous ciphertext block and then encrypted – this is known as block chaining. This prevents identical blocks of plaintext producing the same ciphertext each time they are encrypted
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which is the key distribution problem most an issue for?
symmetric encryption
asymmetric encryption
digital certificate
digital signature
Answer explanation
One issue with symmetric encryption is that both sender and recipient need to use the same secret key. This is a security risk here, since the sender has to supply the key to the recipient. This key could be intercepted. This is referred to as the key distribution problem.
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Quantum cryptography uses the physical properties of ______ to exchange keys.
Answer explanation
Quantum cryptography uses the physical properties of photons to exchange keys.
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
What does QKD mean?
Create a free account and access millions of resources
Similar Resources on Quizizz
49 questions
Web Application and Security Quiz1

Quiz
•
10th Grade
40 questions
Quiz-ASJ

Quiz
•
11th Grade
46 questions
98-366 Lesson 3 Wired and Wireless Networks

Quiz
•
10th Grade - University
45 questions
QUIZ INFORMATIKA

Quiz
•
12th Grade
39 questions
AQA Computer Science GCSE - 3.5 Computer networks

Quiz
•
10th - 12th Grade
40 questions
Assessment AIJ Filadelfia

Quiz
•
12th Grade
43 questions
Cambridge Technicals: Servers and Virtualisation

Quiz
•
11th Grade
48 questions
ESB Domain 1 Lesson 1

Quiz
•
10th - 12th Grade
Popular Resources on Quizizz
20 questions
math review

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
10 questions
Human Body Systems and Functions

Interactive video
•
6th - 8th Grade
19 questions
Math Review

Quiz
•
3rd Grade
45 questions
7th Grade Math EOG Review

Quiz
•
7th Grade
Discover more resources for Computers
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
20 questions
Investing

Quiz
•
9th - 12th Grade
20 questions
EOC Math 1 Review

Quiz
•
9th Grade
20 questions
Insurance

Quiz
•
9th - 12th Grade
20 questions
MCAS Biology Review

Quiz
•
9th - 10th Grade
20 questions
Paying for College

Quiz
•
9th - 12th Grade
20 questions
Math 1 EOC Review

Quiz
•
9th Grade