Search Header Logo

Level 5 - Crypto Quiz 1 of 2

Authored by Eric Jones

others

Used 1+ times

Level 5 - Crypto Quiz 1 of 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the Caesar cipher, if the word "HELLO" is shifted three spaces to the right, what does it become?

A. "KHOOR"
B. "JGNNQ"
C. "DOLWW"
D. "HELLO"

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How are symmetric and asymmetric encryption methods different?

A. Symmetric encryption uses the same key to encrypt and decrypt data, whereas asymmetric encryption uses one key to encrypt and a different key to decrypt data.
B. Symmetric encryption uses one key to encrypt and a different key to decrypt data, whereas asymmetric encryption uses the same key to encrypt and decrypt data.
C. Symmetric encryption uses a single key for encryption only, while asymmetric encryption uses a single key for decryption only.
D. Symmetric encryption is more secure than asymmetric encryption.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements about hashing is NOT correct?

A. When a piece of data is run through a hashing algorithm, it always generates the same hash.
B. Hashing is used on data that does not need to be decrypted, such as a password.
C. A hash can easily be decrypted back to its original value.
D. If even one letter in a file has been altered, the resulting hash would be different.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the process of "salting the hash" involve?

A. Removing additional characters from a password before hashing it
B. Adding random characters to a password before hashing it
C. Increasing the complexity of a password after hashing it
D. Reducing the complexity of a password before hashing it

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main function of a digital signature?

A. Encrypting the data
B. Providing non-repudiation
C. Creating a secure connection
D. Hashing the data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the advantage of Elliptic Curve Cryptography (ECC) over other cryptography methods?

A. ECC is able to generate smaller keys that are more secure than most other methods.
B. ECC uses longer keys which makes it more secure.
C. ECC is the oldest method of cryptography.
D. ECC is the least CPU-intensive encryption method.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the main drawbacks of symmetric encryption?

A. It uses the same key to encrypt and decrypt data
B. It is easily hacked
C. The key must be shared before a user can decrypt a message
D. It is no longer in use

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?