Revision for Chapter 4

Revision for Chapter 4

University

27 Qs

quiz-placeholder

Similar activities

TechZoom24-BugBash_Prelims

TechZoom24-BugBash_Prelims

University

25 Qs

QUIZZ TIC et logiciels métiers

QUIZZ TIC et logiciels métiers

University

25 Qs

Tin học (P1)

Tin học (P1)

University

25 Qs

SAD 223_Quiz

SAD 223_Quiz

University

23 Qs

Fourth Grade March Rivision

Fourth Grade March Rivision

4th Grade - University

24 Qs

Python Module 1

Python Module 1

University

25 Qs

NETZKNOTEN (Web Designing)

NETZKNOTEN (Web Designing)

University

25 Qs

BSEMC2A LABORATORY INFO MANAGEMENT

BSEMC2A LABORATORY INFO MANAGEMENT

University

25 Qs

Revision for Chapter 4

Revision for Chapter 4

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Kevin Wong

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

27 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Each encryption method uses a specific algorithm, called a cipher, to encrypt and decrypt messages. A cipher is a series of well-defined steps used to encrypt and decrypt messages. There are three methods of creating ciphertext:

Transposition

Substitution

One-time pad

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

1st type of Encryption: _________ algorithms

Answer explanation

Media Image

Symmetric algorithms - These algorithms use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data. Both the sender and receiver know the pre-shared key before any encrypted communication begins.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

2nd type of Encryption: _________ algorithms

Answer explanation

Media Image

Asymmetric algorithms - Asymmetrical encryption algorithms use one key to encrypt data and a different key to decrypt data. One key is public and the other is private. In a public-key encryption system, any person can encrypt a message using the public key of the receiver, and the receiver is the only one that can decrypt it using his private key. Parties exchange secure messages without needing a pre-shared key. Asymmetric algorithms are more complex. These algorithms are resource intensive and slower to execute.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(Cryptography)
Symmetrical versus Asymmetrical Encryption over handling more data

Symmetric encryption

Asymmetric encryption

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

List the types of encryption algorithm and provide the encryption standard for each class

Symmetric - Triple Digital Encryption Standard (3DES)

Symmetric - Advanced Encryption Standard (AES)

Symmetric - International Data Encryption Algorithm (IDEA)

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

List the other type of encryption algorithm and

provide the various encryption standard for each class

Asymmetric - Rivest_ Shamir-Adleman (RSA)

Asymmetric - Diffie-Hellman

Asymmetric - EIGamal

Asymmetric - Elliptic Curve Cryptography (ECC)

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A product consultant had recommended to his team an algorithm that

is used in New Technology File System (NTFS).

Identify the algorithm recommended by the product consultant

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?