QUIZ 1

QUIZ 1

University

6 Qs

quiz-placeholder

Similar activities

JFFT

JFFT

University

10 Qs

DIGITAL BUSINESS  QUIZ

DIGITAL BUSINESS QUIZ

University

3 Qs

CNS

CNS

University

10 Qs

Networking Concepts Part 2

Networking Concepts Part 2

12th Grade - Professional Development

7 Qs

Quiz-1

Quiz-1

University

10 Qs

H&N ANATOMY Chapter 6

H&N ANATOMY Chapter 6

University

10 Qs

COMMUNICATIONS

COMMUNICATIONS

University

8 Qs

CHAPTER 4 Quiz

CHAPTER 4 Quiz

University

10 Qs

QUIZ 1

QUIZ 1

Assessment

Quiz

Other

University

Easy

Created by

Harwinda Haris

Used 1+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement that describes symmetric encryption?

It uses two different keys for encryption and decryption

Messages encrypted with a specific key and only be decrypted by that same key

Symmetric encryption offer non-repudiation protection due to its key sharing mechanism

It relies on a private key and a public key for encryption and decryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is difference between asymmetric encryption and symmetric encryption?

Asymmetric encryption uses the same key for encrypting or decrypting data

Symmetric encryption relies on a private key and public key

Asymmetric encryption is computationally slower than symmetric encryption

Symmetric encryption offers confidentality protection through private key encryption system

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following scenarios primarily benefits from using hashing?

A company needs to send confidential documents over an insecure network.

A website needs to securely store user login passwords.

A cloud provider wants to detect if malware has infected a virtual machine.

A user wants to ensure a downloaded software installer is the official version.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does hashing help ensure data integrity?

It makes the data unreadable without a specific decryption key.

It creates a unique fingerprint of the data that changes if the data is modified.

It compresses the data, making it smaller and harder to intercept.

It automatically creates backups of the data in case of corruption.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is digital signature?

A handwritten signature scanned into a computer system.

A series of random characters generated by a computer program.

A secure hash function applied to a digital document.

A photo of a person's signature attached to an electronic document.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Digital signature requires by combining

Hashing

Assymmetric encryption

Symmetric encryption

Encoding