Cryptography (E-Commerce)

Cryptography (E-Commerce)

University

5 Qs

quiz-placeholder

Similar activities

be, have, there+be

be, have, there+be

University

10 Qs

Mastering Presentation Gestures

Mastering Presentation Gestures

University

10 Qs

Communication and Documentation Quiz

Communication and Documentation Quiz

University

10 Qs

GROUP 2 REPORT

GROUP 2 REPORT

University

10 Qs

Evaluación de SQA

Evaluación de SQA

University

10 Qs

Koha Quiz

Koha Quiz

University

10 Qs

Copy of U1 W3 Vocabulary

Copy of U1 W3 Vocabulary

4th Grade - University

8 Qs

Effective Constructivist Teaching Learning in the Classroom

Effective Constructivist Teaching Learning in the Classroom

University

10 Qs

Cryptography (E-Commerce)

Cryptography (E-Commerce)

Assessment

Quiz

others

University

Medium

Created by

Sangatamil A

Used 1+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Dynamic packet filters firewall are fourth generation firewalls that work at

Application layer

TCP

TCP, UDP

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A message is encrypted using public key cryptography to send a message from sender to receiver. Which one of the following statements is True?

Sender encrypts using receiver’s public key

Sender encrypts using his own public key

Receiver decrypts using sender’s public key

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Dynamic packet filters firewall are fourth generation firewalls that work at

TCP, UDP

UDP

Session Layer

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the key size of Data Encryption Standard algorithm in cryptography ?

56 bit

62 bit

168 bit

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One commonly used public-key cryptography method is  the ______ algorithm.

RSA

RSS

RAA