
Cryptography and Network Security
Authored by pavithra panthangi
Other
University
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In symmetric-key cryptography, the key locks and unlocks the box is
Shared
Same
Private
Public
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The acronym DES stands for
Double Encryption Standard
Digital Evaluation System
Data Encryption Standard
Digital Encryption System
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Encryption Strength is based on
Strength of algorithm
Length of key
Secrecy of key
All of the above
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In asymmetric key cryptography, the private key is kept by ________
Sender
Receiver
All the connected devices to the network
Sender and receiver
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The ________ is the original message before transformation
Secret-text
Plaintext
Ciphertext
None of the above
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In cryptography, the order of letters in a message is rearranged by ________
Transpositional ciphers
Substitution ciphers
Both (A) and (B)
Quadratic ciphers
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A/an ________ algorithm transforms ciphertext to plaintext
Encryption
Decryption
Both (A) and (B)
None of the above
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?