Search Header Logo

IAS QUIZ 9

Authored by Darwin Vargas

Computers

University

Used 2+ times

IAS QUIZ 9
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Asymmetric encryption utilizes only a public key for encryption

and decryption.

T

F

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Asymmetric encryption can be used for confidentiality but not for

authentication.

T

F

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Plaintext is transformed into ciphertext using two keys and a

decryption algorithm.

T

F

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A major advance in symmetric cryptography occurred with the

development of the rotor encryption/decryption machine.

T

F

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Public-key encryption is more secure from cryptanalysis than

symmetric encryption.

T

F

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Much of the theory of public-key cryptosystems is based on

number theory.

T

F

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Asymmetric algorithms rely on one key for encryption and a

different but related key for decryption.

T

F

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?