Cryptography & Hashing

Cryptography & Hashing

12th Grade

29 Qs

quiz-placeholder

Similar activities

CIST 1601: Chapter 7 Quiz Prep

CIST 1601: Chapter 7 Quiz Prep

C3 Crypto & PKI Review

C3 Crypto & PKI Review

Network Security - Modules 15 – 17: Cryptography Group Exam

Network Security - Modules 15 – 17: Cryptography Group Exam

Hashing, Digital Signatures and BlockChain Practice Questions

Hashing, Digital Signatures and BlockChain Practice Questions

CIW IBA Lesson 8 Vocabulary

CIW IBA Lesson 8 Vocabulary

Advanced Cryptography Quiz

Advanced Cryptography Quiz

ITF - Uses of Encryption - Quiz 14.4

ITF - Uses of Encryption - Quiz 14.4

Cryptography & Hashing

Cryptography & Hashing

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Laura Viar

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

29 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following algorithms are used in asymmetric encryption? (Select two.)

RSA

Twofish

Blowfish

Diffie-Hellman

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following algorithms are used in symmetric encryption? (Select two.)

RSA

3DES

Diffie-Hellman

Blowfish

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Cryptographic systems provide which of the following security services? (Select two.)

Decryption

Encryption

Confidentiality

Non-repudiation

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following functions are performed by a TPM? (Trusted Platform Module)

Create a hash of system components

Encrypt network data using IPsec

Provide authentication credentials

Perform bulk encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A birthday attack focuses on which of the following?

Hashing algorithms

E-commerce

Encrypted files

VPN links

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the weakest hashing algorithm?

MD5

SHA-1

AES

DES

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main function of a TPM hardware chip?

Provide authentication credentials on a hardware device

Perform bulk encryption in a hardware processor

Generate and store cryptographic keys

Control access to removable media

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?