Revision for Chapter 4

Revision for Chapter 4

University

27 Qs

quiz-placeholder

Similar activities

Mock Test

Mock Test

University

27 Qs

IAS CH2 QUIZ

IAS CH2 QUIZ

University

25 Qs

Chapter 10: Security

Chapter 10: Security

11th Grade - University

25 Qs

Teknologi Layanan Jaringan

Teknologi Layanan Jaringan

University

25 Qs

Cryptography Quiz 1

Cryptography Quiz 1

University

25 Qs

ICT 161-190

ICT 161-190

University

30 Qs

Cryptography

Cryptography

University

23 Qs

NETWORK SECURITY

NETWORK SECURITY

University

25 Qs

Revision for Chapter 4

Revision for Chapter 4

Assessment

Quiz

Computers

University

Hard

Created by

Kevin Wong

Used 1+ times

FREE Resource

27 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Each encryption method uses a specific algorithm, called a cipher, to encrypt and decrypt messages. A cipher is a series of well-defined steps used to encrypt and decrypt messages. There are three methods of creating ciphertext:

Transposition

Substitution

One-time pad

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

1st type of Encryption: _________ algorithms

Answer explanation

Media Image

Symmetric algorithms - These algorithms use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data. Both the sender and receiver know the pre-shared key before any encrypted communication begins.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

2nd type of Encryption: _________ algorithms

Answer explanation

Media Image

Asymmetric algorithms - Asymmetrical encryption algorithms use one key to encrypt data and a different key to decrypt data. One key is public and the other is private. In a public-key encryption system, any person can encrypt a message using the public key of the receiver, and the receiver is the only one that can decrypt it using his private key. Parties exchange secure messages without needing a pre-shared key. Asymmetric algorithms are more complex. These algorithms are resource intensive and slower to execute.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(Cryptography)
Symmetrical versus Asymmetrical Encryption over handling more data

Symmetric encryption

Asymmetric encryption

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

List the types of encryption algorithm and provide the encryption standard for each class

Symmetric - Triple Digital Encryption Standard (3DES)

Symmetric - Advanced Encryption Standard (AES)

Symmetric - International Data Encryption Algorithm (IDEA)

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

List the other type of encryption algorithm and

provide the various encryption standard for each class

Asymmetric - Rivest_ Shamir-Adleman (RSA)

Asymmetric - Diffie-Hellman

Asymmetric - EIGamal

Asymmetric - Elliptic Curve Cryptography (ECC)

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A product consultant had recommended to his team an algorithm that

is used in New Technology File System (NTFS).

Identify the algorithm recommended by the product consultant

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?