
Advanced Cryptography Quiz
Authored by Ms B
Computers
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A primary requirement for a good cryptographic hash function is that the function should not have collisions. A collision in a hash function is when:
there are few inputs, but a lot of outputs
two inputs map to the same output
two outputs come from the same input
there are few outputs, but a lot of inputs
Answer explanation
A collision in a hash function occurs when two inputs map to the same output, making it a primary requirement for a good cryptographic hash function to avoid collisions.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following ciphers uses asymmetric encryption?
AES
Caesar Cipher
DES
RSA
Answer explanation
RSA is the only cipher listed that uses asymmetric encryption, where different keys are used for encryption and decryption. Therefore, the correct choice is RSA.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which is the largest disadvantage of symmetric encryption?
It is not used any more
It is more complex and more time-consuming
It is difficult to securely transmit the secret key
It is less secure when compared to asymmetric encryption
Answer explanation
The largest disadvantage of symmetric encryption is that it is less secure when compared to asymmetric encryption, making it more vulnerable to security breaches.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During asymmetric encryption, Nicholas will use ______ to open a message from Allie.
His public key
His private key
Allie’s public key
Allie’s private key
Answer explanation
During asymmetric encryption, Nicholas will use Allie’s public key to open a message from Allie.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Protecting data by hashing the data with a hashing function addresses which part(s) of the CIA triad?
Confidentiality only
Integrity only
Availability only
Confidentiality and Integrity
Confidentiality and Availability
Answer explanation
Hashing the data with a hashing function addresses the Integrity part of the CIA triad by ensuring that the data has not been altered or tampered with.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the chain of trust, what is the name of the certificate that belongs to the issuer of the certificate?
The server certificate
The root certificate
The primary certificate
The intermediate certificate
Answer explanation
In the chain of trust, the certificate that belongs to the issuer of the certificate is called the root certificate.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hash function takes an input of any length and converts it into an output of a fixed length. What term is used for this output?
field
digest
password
message
Answer explanation
The term used for the output of a hash function, which is of a fixed length, is 'digest'.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Skill Competition Quiz 2024
Quiz
•
10th Grade - University
20 questions
Spreadsheet Fundamentals - Quiz2
Quiz
•
University
15 questions
OM_SBENT3C_Q2
Quiz
•
University - Professi...
20 questions
Data Science Part A
Quiz
•
1st - 5th Grade
20 questions
MEL1, MEL5 Lower Sec CPA - Vector and Raster Graphics Quiz
Quiz
•
8th Grade
20 questions
ICT10-M4-What's IN
Quiz
•
10th Grade
15 questions
PARTS OF COMPUTER YEAR 1
Quiz
•
1st Grade
16 questions
preguntas de fortnite
Quiz
•
5th Grade
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
12 questions
Presidents' Day
Quiz
•
KG - 5th Grade
11 questions
FOREST Growth Mindset
Lesson
•
KG
10 questions
THEME
Quiz
•
KG - University
7 questions
Copy of G5_U5_L14_22-23
Lesson
•
KG - Professional Dev...
10 questions
Add & Subtract Mixed Numbers with Like Denominators
Quiz
•
KG - University
10 questions
Long i- igh, ie, and y Quiz
Quiz
•
KG - 3rd Grade
10 questions
2D & 3D Shapes
Quiz
•
KG
20 questions
Capitalization in sentences
Quiz
•
KG - 4th Grade