Search Header Logo

Cryptography

Authored by Chaami Hulangamuwa

Computers

University

Used 29+ times

Cryptography
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe the science of making and breaking secret codes?

cryptology

impersonation

spoofing

factorization

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cipher is able to encrypt a fixed-length block of plaintext into a 128-bit block of ciphertext at any one time?

hash

symmetric

block

stream

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which three devices represent examples of physical access controls?

firewalls

locks

routers

All of Above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?

hash

one-time pad

symmetric

asymmetric

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cipher encrypts plaintext one byte or one bit at a time?

block

enigma

hash

stream

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

symmetric

transposition

one-time pad

asymmetric

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

two private keys are required in the following cipher

caesar

vigenere

symmetrical

asymmetrical

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers