
Advanced Cryptography Quiz
Quiz
•
Computers
•
•
Practice Problem
•
Hard
Ms B
Used 1+ times
FREE Resource
Enhance your content in a minute
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A primary requirement for a good cryptographic hash function is that the function should not have collisions. A collision in a hash function is when:
there are few inputs, but a lot of outputs
two inputs map to the same output
two outputs come from the same input
there are few outputs, but a lot of inputs
Answer explanation
A collision in a hash function occurs when two inputs map to the same output, making it a primary requirement for a good cryptographic hash function to avoid collisions.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following ciphers uses asymmetric encryption?
AES
Caesar Cipher
DES
RSA
Answer explanation
RSA is the only cipher listed that uses asymmetric encryption, where different keys are used for encryption and decryption. Therefore, the correct choice is RSA.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which is the largest disadvantage of symmetric encryption?
It is not used any more
It is more complex and more time-consuming
It is difficult to securely transmit the secret key
It is less secure when compared to asymmetric encryption
Answer explanation
The largest disadvantage of symmetric encryption is that it is less secure when compared to asymmetric encryption, making it more vulnerable to security breaches.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During asymmetric encryption, Nicholas will use ______ to open a message from Allie.
His public key
His private key
Allie’s public key
Allie’s private key
Answer explanation
During asymmetric encryption, Nicholas will use Allie’s public key to open a message from Allie.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Protecting data by hashing the data with a hashing function addresses which part(s) of the CIA triad?
Confidentiality only
Integrity only
Availability only
Confidentiality and Integrity
Confidentiality and Availability
Answer explanation
Hashing the data with a hashing function addresses the Integrity part of the CIA triad by ensuring that the data has not been altered or tampered with.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the chain of trust, what is the name of the certificate that belongs to the issuer of the certificate?
The server certificate
The root certificate
The primary certificate
The intermediate certificate
Answer explanation
In the chain of trust, the certificate that belongs to the issuer of the certificate is called the root certificate.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hash function takes an input of any length and converts it into an output of a fixed length. What term is used for this output?
field
digest
password
message
Answer explanation
The term used for the output of a hash function, which is of a fixed length, is 'digest'.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
1.1.1 The structure and function of the processor
Quiz
•
11th Grade - University
15 questions
LEDs on micro:bit
Quiz
•
8th Grade
20 questions
Asas Komputer
Quiz
•
3rd Grade
18 questions
CIS2303 Week 4_5 Ch_3
Quiz
•
University
20 questions
WML & WAP
Quiz
•
University
15 questions
REVIEW QUIZ
Quiz
•
7th Grade
15 questions
Computer basics for beginners
Quiz
•
Professional Development
20 questions
Software Engineering Quiz 1
Quiz
•
University
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Computers
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
20 questions
Disney Characters
Quiz
•
KG
10 questions
Christmas/Winter
Quiz
•
KG - 2nd Grade
10 questions
Christmas Characters
Quiz
•
KG - 3rd Grade
20 questions
christmas songs
Quiz
•
KG - University
20 questions
Place Value
Quiz
•
KG - 3rd Grade
10 questions
Christmas Movies
Quiz
•
KG - 12th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
KG - 3rd Grade
