Search Header Logo

Digital Signeture

Authored by Amit Mandal

Computers

University

Used 3+ times

Digital Signeture
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

13 questions

Show all answers

1.

OPEN ENDED QUESTION

20 sec • Ungraded

Name

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

20 sec • Ungraded

Roll No

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

20 sec • 1 pt

Section

Evaluate responses using AI:

OFF

4.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Which of the following are used to create a message digest by the network security protocols?

RSA
SHA-1
DES
MD5

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

When a hash function is used to provide message authentication, the hash function value is called to as

Message Field
Message Digest
Message Score
Message Leap

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A digital signature is a mathematical technique which validates?

authenticity
integrity
Non-repudiation
All of the above

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_____________ is a process which verifies the identity of a user who wants to access the system.

Authentication
Non-repudiation
Integrity
None of the above

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?