Digital Signature

Digital Signature

University

7 Qs

quiz-placeholder

Similar activities

Workshop Day 2

Workshop Day 2

University

10 Qs

Unit 4 - Project Based Learning

Unit 4 - Project Based Learning

University

10 Qs

Quiz CH4

Quiz CH4

University

12 Qs

Modernization of NTUC Income

Modernization of NTUC Income

University

10 Qs

SIM Pertemuan 1

SIM Pertemuan 1

University

11 Qs

SLOT LAD

SLOT LAD

University - Professional Development

9 Qs

Metaverse 101 - NFT

Metaverse 101 - NFT

University

10 Qs

UNIT3-PUBLIC KEY CRYPTOGRAPHY

UNIT3-PUBLIC KEY CRYPTOGRAPHY

University

10 Qs

Digital Signature

Digital Signature

Assessment

Quiz

Education

University

Hard

Created by

Yuvraj Saroha

Used 1+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many algorithms digital signature consists of?

2

6

3

4

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A _________ produces a signature for the document.

A. Key generation algorithm

B. Signing algorithm

C. Signature verifying algorithm

D. Authentication

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A digital signature needs a

A. Private-key system

B. Shared-key system

C. Public-key system

D.All of them

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which signatures include details such as an image of our physical signature, location, date, and official seal?

A. Approval Signatures

B. Certified Signatures

C. Visible Digital Signature

D. Invisible Digital Signature

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which algorithm algorithm provides the private key and its corresponding public key?

A. Key generation algorithm

B. Signature verifying algorithm

C. Signing algorithm

D. None of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

 Which signature allows a user to sign a single document digitally?

A. Approval Signatures

B. Certified Signatures

C. Visible Digital Signature

D. Invisible Digital Signature

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7. _____________ is a process which verifies the identity of a user who wants to access the system.

A. Authentication

B. Non-repudiation

C. Integrity

D. None of the above