Session assessment

Session assessment

University

15 Qs

quiz-placeholder

Similar activities

How Safe are you? (Disclaimer: I do not own these questions)

How Safe are you? (Disclaimer: I do not own these questions)

University

10 Qs

MT_Chapter 5 & 6 (set 2)

MT_Chapter 5 & 6 (set 2)

University

10 Qs

Kuiz 3

Kuiz 3

12th Grade - University

20 Qs

General Ict Quiz

General Ict Quiz

4th Grade - University

15 Qs

Planning and Implementation of Information Security

Planning and Implementation of Information Security

University

10 Qs

Data Security Worksheet

Data Security Worksheet

10th Grade - University

15 Qs

HCI QUIZ #1 and #2

HCI QUIZ #1 and #2

University

15 Qs

SPCC ISE 2 Quiz TE B

SPCC ISE 2 Quiz TE B

University

20 Qs

Session assessment

Session assessment

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Mohammad Siddiqui

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following is/are cryptographic tool

GPG

PGP

BitLocker

TCP/IP

openSSL

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you list the available cryptographic algorithms on gpg tool

gpg --list-algo

gpg --version

gpg --algorithms

gpg --algo-lists

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between symmetric-key and public-key cryptography?

Symmetric-key cryptography is more secure than public-key cryptography.

Symmetric key cryptography is used in ecommerce while public-key cryptography is use din military communication

Symmetric key cryptography uses one key for both encryption and decryption while public-key cryptography use two different keys but mathematically related

Symmetric key cryptography is based on number theory while public-key cryptography is base don complex theory

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a core concept related to information security that is central to cryptography?

Data confidentiality

Data Integrity

Data Availability

Autehntication

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following is/are symmetric-key algorithm(s)?

Blowfish

DES

Diffie-Hellmann

MD5

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following is/are public-key algorithm(s)?

RSA

DES

El Gamal

DSA

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following is/are hashing algorithms?

MD4

DES

SHA-1

SHA-256

DSA

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers