
PV080 Revision
Authored by Michael Koudela
Computers
University
Used 12+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
1. You send 3 messages but the person observing the network cannot find out they were sent by the same person. It is:
anonymity
pseudonymity
unlinkability
unobservability
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
2. Which of the following are valid reasons for collecting personal data according to GDPR?
The vital interest of the individual
Marketing and personalized services
Consent of the individual
Public interest
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
3. Which of the statements about Vernam cipher are true?
It is a symmetric cipher
It enables us to reach perfect security
It is a block cipher
Same key can be reused without consequences
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
4. Which AES mode is the least secure?
ECB
CBC
CTR
all have similar security
5.
MULTIPLE SELECT QUESTION
1 min • 1 pt
5. Which of the statements are correct?
Asymmetric cryptography is faster than symmetric
Asymmetric cryptography requires longer keys
Hybrid cryptography combines both symmetric and asymmetric approaches.
Asymmetric cryptography can provide non-repudiation of sending.
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
6. Which of the following mechanisms are based on symmetric cryptography?
MAC
HMAC
digital signature
hash function
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
7. Which of the following features are typically not parts of the public key certificate?
issuer (CA) and its signature
private key
validity period
public key
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?