Crypto-All around

Crypto-All around

19 Qs

quiz-placeholder

Similar activities

CSF Chap 4 Quiz

CSF Chap 4 Quiz

3rd Grade

21 Qs

Block Cipher

Block Cipher

University

20 Qs

Chapter 7 Payment Systems

Chapter 7 Payment Systems

University

18 Qs

kuiz ASK T3 : kriptografi

kuiz ASK T3 : kriptografi

8th Grade

18 Qs

Blockchain Quiz

Blockchain Quiz

Professional Development

15 Qs

STEAM CAT

STEAM CAT

5th Grade

20 Qs

Prueba corta 13/marzo/2020 Programación

Prueba corta 13/marzo/2020 Programación

9th - 12th Grade

15 Qs

INformation Security

INformation Security

University

15 Qs

Crypto-All around

Crypto-All around

Assessment

Quiz

Other

Medium

Created by

Avinav Neupane

Used 9+ times

FREE Resource

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is the primary focus of authentication ?

Verifying identity

Granting access

Assigning permissions

Ensuring confidentiality

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which of the following best describes authorization ?

Verifying identity

Granting access

Ensuring confidentiality

Assigning permissions

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is a suitable example of authentication ?

A system encrypting sensitive data

A user accessing a restricted file

A system assigning specific roles to users

A user entering a password

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which of the following scenarios best represents authorization ?

Verifying a user's identity through biometrics

Allowing a user to read and write files in a specific directory

Encrypting communication between two parties

Verifying the integrity of a digital signature

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

In symmetric key encryption (Example : Caesar Cipher), how many keys are used for both encryption and decryption ?

1

2

3

4

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What distinguishes asymmetric key encryption from symmetric key encryption ?

Use of multiple keys for encryption and decryption

Use of variable key lengths for encryption and decryption

Use of different keys for encryption and decryption

Use of the same key for encryption and decryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is a characteristic of symmetric key encryption ?

More computationally intensive

Enables perfect forward secrecy

Suitable for public-key infrastructure

Requires key distribution

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?