Level 5 - Crypto Quiz 1 of 2

Level 5 - Crypto Quiz 1 of 2

20 Qs

quiz-placeholder

Similar activities

Scientific Data

Scientific Data

KG - University

20 Qs

Vocab Set #4: Unit 1 Scientific Concepts 4

Vocab Set #4: Unit 1 Scientific Concepts 4

KG - University

15 Qs

ICT 2213 - 10. Digital signatures MCQ Questions

ICT 2213 - 10. Digital signatures MCQ Questions

KG - University

25 Qs

Topic 10- Analysing International Opportunities BBDM3134 (1)

Topic 10- Analysing International Opportunities BBDM3134 (1)

University

15 Qs

ICT 2213 - 11. Key management I

ICT 2213 - 11. Key management I

KG - University

15 Qs

Cyber Shiksha Sept 22

Cyber Shiksha Sept 22

KG - University

20 Qs

Unit 15: Hardware and Virtual Machines Quiz

Unit 15: Hardware and Virtual Machines Quiz

KG - University

20 Qs

Level 5 - Crypto Quiz 1 of 2

Level 5 - Crypto Quiz 1 of 2

Assessment

Quiz

others

Hard

Created by

Eric Jones

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the Caesar cipher, if the word "HELLO" is shifted three spaces to the right, what does it become?
A. "KHOOR"
B. "JGNNQ"
C. "DOLWW"
D. "HELLO"

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How are symmetric and asymmetric encryption methods different?
A. Symmetric encryption uses the same key to encrypt and decrypt data, whereas asymmetric encryption uses one key to encrypt and a different key to decrypt data.
B. Symmetric encryption uses one key to encrypt and a different key to decrypt data, whereas asymmetric encryption uses the same key to encrypt and decrypt data.
C. Symmetric encryption uses a single key for encryption only, while asymmetric encryption uses a single key for decryption only.
D. Symmetric encryption is more secure than asymmetric encryption.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements about hashing is NOT correct?
A. When a piece of data is run through a hashing algorithm, it always generates the same hash.
B. Hashing is used on data that does not need to be decrypted, such as a password.
C. A hash can easily be decrypted back to its original value.
D. If even one letter in a file has been altered, the resulting hash would be different.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the process of "salting the hash" involve?
A. Removing additional characters from a password before hashing it
B. Adding random characters to a password before hashing it
C. Increasing the complexity of a password after hashing it
D. Reducing the complexity of a password before hashing it

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main function of a digital signature?
A. Encrypting the data
B. Providing non-repudiation
C. Creating a secure connection
D. Hashing the data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the advantage of Elliptic Curve Cryptography (ECC) over other cryptography methods?
A. ECC is able to generate smaller keys that are more secure than most other methods.
B. ECC uses longer keys which makes it more secure.
C. ECC is the oldest method of cryptography.
D. ECC is the least CPU-intensive encryption method.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the main drawbacks of symmetric encryption?
A. It uses the same key to encrypt and decrypt data
B. It is easily hacked
C. The key must be shared before a user can decrypt a message
D. It is no longer in use

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?