
CRYPTOGRAPHY
Authored by Guru Vimal Kumar
Computers
University
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A message is authentic and digitally signed if sent with:
A message digest/hash encrypted with the sender’s private key
A message digest/hash encrypted with the sender’s public key
A message digest/hash encrypted with the receiver’s private key
A message digest/hash encrypted with the receiver’s private key
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Digital Signatures are:
Proof of authenticity of the sender
Proof of authenticity of the receiver
Proof of authenticity of the verifier
Proof of authenticity of Alice
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In symmetric-key cryptography, the key used by sender and receiver is
Different
Shared
Two keys are used
None
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Advanced Encryption Standard (AES), has three different configurations with respect to number of rounds and
Key Size
Datasize
Round Size
Encryption Size
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hash function guarantees integrity of a message. It guarantees that message has not be
Replaced
Over view
Changed
Left
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Message digest is referred to:
RSA
Digital signature
Hash function
Digital signature with hash function
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
SHA means:
Secret Hash Algorithm
Secure Hash Algorithm
Sneaky Hash Algorithm
Super Hash Algorithm
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?