Search Header Logo

Cryptography & Hashing

Authored by Laura Viar

Computers

12th Grade

Used 1+ times

Cryptography & Hashing
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

29 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following algorithms are used in asymmetric encryption? (Select two.)

RSA

Twofish

Blowfish

Diffie-Hellman

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following algorithms are used in symmetric encryption? (Select two.)

RSA

3DES

Diffie-Hellman

Blowfish

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Cryptographic systems provide which of the following security services? (Select two.)

Decryption

Encryption

Confidentiality

Non-repudiation

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following functions are performed by a TPM? (Trusted Platform Module)

Create a hash of system components

Encrypt network data using IPsec

Provide authentication credentials

Perform bulk encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A birthday attack focuses on which of the following?

Hashing algorithms

E-commerce

Encrypted files

VPN links

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the weakest hashing algorithm?

MD5

SHA-1

AES

DES

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main function of a TPM hardware chip?

Provide authentication credentials on a hardware device

Perform bulk encryption in a hardware processor

Generate and store cryptographic keys

Control access to removable media

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?