Search Header Logo

Cryptographic hard

Authored by Pancho Villa

Other

Used 3+ times

Cryptographic hard
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

13 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

What is the primary purpose of cryptography in information security?

To ensure data integrity

To prevent unauthorized access

To ensure non-repudiation

To store data in a secure way

Answer explanation

Cryptography ensures data integrity, prevents unauthorized access, and ensures non-repudiation.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What are some limitations of using cryptography for securing data?

Cryptography can prevent access to data in a cyberattack

Cryptography can prevent data from being intercepted during transmission.

Cryptography can make data unreadable to unauthorized users but cannot prevent data loss or destruction.

All of above

Answer explanation

While cryptography can make data unreadable to unauthorized users, it cannot prevent data loss or destruction.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the difference between symmetric and asymmetric encryption?

Symmetric uses the same key for encryption and decryption, while asymmetric uses different keys.

Symmetric uses different keys for encryption and decryption, while asymmetric uses the same key.

Symmetric is less secure than asymmetric.

Asymmetric is less secure than symmetric.

Answer explanation

Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses different keys (public key for encryption and private key for decryption).

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a cryptographic hash function?

  • A function that ensures data integrity


A function that converts plaintext into ciphertext

A function that ensures non-repudiation

A function that converts an input (or ‘message’) into a fixed-size string of bytes

Answer explanation

A cryptographic hash function is a special class of hash functions which has various kinds of security applications in information security.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the main use of a digital signature?

It verifies the authenticity of digital messages or documents.

It encrypts messages or documents.

It decrypts messages or documents.

It hashes messages or documents.

Answer explanation

A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the role of a certificate authority in a Public Key Infrastructure (PKI)?

It issues digital certificates.

It manages keys and certificates.

It provides a directory service.

All of the above

Answer explanation

In cryptography, a certificate authority or certification authority (CA) is an entity that issues digital certificates and manages keys and certificates.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the difference between block ciphers and stream ciphers?

Block ciphers encrypt data in blocks, while stream ciphers encrypt data one bit at a time.

Stream ciphers encrypt data in blocks, while block ciphers encrypt data one bit at a time.

Block ciphers are more secure than stream ciphers.

All of above

Answer explanation

Block ciphers encrypt data in blocks, while stream ciphers encrypt data one bit at a time.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?