
Level 5 - Crypto Quiz 1 of 2
Authored by Eric Jones
others
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the Caesar cipher, if the word "HELLO" is shifted three spaces to the right, what does it become?
A. "KHOOR"
B. "JGNNQ"
C. "DOLWW"
D. "HELLO"
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How are symmetric and asymmetric encryption methods different?
A. Symmetric encryption uses the same key to encrypt and decrypt data, whereas asymmetric encryption uses one key to encrypt and a different key to decrypt data.
B. Symmetric encryption uses one key to encrypt and a different key to decrypt data, whereas asymmetric encryption uses the same key to encrypt and decrypt data.
C. Symmetric encryption uses a single key for encryption only, while asymmetric encryption uses a single key for decryption only.
D. Symmetric encryption is more secure than asymmetric encryption.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following statements about hashing is NOT correct?
A. When a piece of data is run through a hashing algorithm, it always generates the same hash.
B. Hashing is used on data that does not need to be decrypted, such as a password.
C. A hash can easily be decrypted back to its original value.
D. If even one letter in a file has been altered, the resulting hash would be different.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the process of "salting the hash" involve?
A. Removing additional characters from a password before hashing it
B. Adding random characters to a password before hashing it
C. Increasing the complexity of a password after hashing it
D. Reducing the complexity of a password before hashing it
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main function of a digital signature?
A. Encrypting the data
B. Providing non-repudiation
C. Creating a secure connection
D. Hashing the data
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the advantage of Elliptic Curve Cryptography (ECC) over other cryptography methods?
A. ECC is able to generate smaller keys that are more secure than most other methods.
B. ECC uses longer keys which makes it more secure.
C. ECC is the oldest method of cryptography.
D. ECC is the least CPU-intensive encryption method.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one of the main drawbacks of symmetric encryption?
A. It uses the same key to encrypt and decrypt data
B. It is easily hacked
C. The key must be shared before a user can decrypt a message
D. It is no longer in use
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?