CASP+: Chapter 9A

CASP+: Chapter 9A

University

23 Qs

quiz-placeholder

Similar activities

Information and Communication Technology Security - Pre-Test

Information and Communication Technology Security - Pre-Test

University

20 Qs

Cybersecurity Essentials Chapter 5 Review

Cybersecurity Essentials Chapter 5 Review

9th Grade - University

20 Qs

Cybersecurity Essentials Chapter 2 Review

Cybersecurity Essentials Chapter 2 Review

9th Grade - University

20 Qs

IAS QUIZ 11

IAS QUIZ 11

University

25 Qs

CIW IBA Lesson 8 Vocabulary

CIW IBA Lesson 8 Vocabulary

8th Grade - Professional Development

21 Qs

Cryptography

Cryptography

University

23 Qs

Threats, Issues, and Defenses - Ch 5

Threats, Issues, and Defenses - Ch 5

10th Grade - University

20 Qs

UNIT-IV: E-mail and IP Security

UNIT-IV: E-mail and IP Security

University

25 Qs

CASP+: Chapter 9A

CASP+: Chapter 9A

Assessment

Quiz

Computers

University

Medium

Created by

Khairul Imtiyaz

Used 1+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of the SHA-3 algorithm?

Digital signatures

Message authentication

Key exchange

Hashing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cryptographic algorithm was selected by NIST as the replacement for SHA-1 in 2012?

SHA-256

MD5

SHA-1.2

SHA-3

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which encryption program is RIPEMD utilized?

PGP

AES

RSA

SHA-256

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key characteristic of hashing algorithms regarding the length of their output?

Variable length

Random length

Fixed length

Infinite length

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which property of hashing ensures that the same input will always produce the same output when hashed using the same algorithm?

Variable output

Consistency

Random output

Unpredictability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key distribution problem associated with symmetric encryption?

Ensuring confidentiality of data

Managing public and private keys

Safely sharing keys between parties

Ensuring integrity of transmitted data

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cipher is Salsa20?

Block

Stream

Asymmetric

Public

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?