IAS QUIZ 9

IAS QUIZ 9

University

25 Qs

quiz-placeholder

Similar activities

Cysec Club - Workshop Quiz

Cysec Club - Workshop Quiz

University

20 Qs

IAS CH2 QUIZ

IAS CH2 QUIZ

University

25 Qs

Networking Elements: GCSE 9-1

Networking Elements: GCSE 9-1

9th Grade - University

20 Qs

Section 7: Security (6-8)

Section 7: Security (6-8)

University

22 Qs

Information Security Quiz

Information Security Quiz

University

21 Qs

Mock Test

Mock Test

University

27 Qs

Arth-test

Arth-test

University

20 Qs

IAS 101 - Week 11 and 12 - Cryptography

IAS 101 - Week 11 and 12 - Cryptography

University

20 Qs

IAS QUIZ 9

IAS QUIZ 9

Assessment

Quiz

Computers

University

Easy

Created by

Darwin Vargas

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Asymmetric encryption utilizes only a public key for encryption

and decryption.

T

F

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Asymmetric encryption can be used for confidentiality but not for

authentication.

T

F

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Plaintext is transformed into ciphertext using two keys and a

decryption algorithm.

T

F

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A major advance in symmetric cryptography occurred with the

development of the rotor encryption/decryption machine.

T

F

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Public-key encryption is more secure from cryptanalysis than

symmetric encryption.

T

F

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Much of the theory of public-key cryptosystems is based on

number theory.

T

F

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Asymmetric algorithms rely on one key for encryption and a

different but related key for decryption.

T

F

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?