Search Header Logo

QUIZ 1

Authored by Harwinda Haris

Other

University

Used 1+ times

QUIZ 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement that describes symmetric encryption?

It uses two different keys for encryption and decryption

Messages encrypted with a specific key and only be decrypted by that same key

Symmetric encryption offer non-repudiation protection due to its key sharing mechanism

It relies on a private key and a public key for encryption and decryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is difference between asymmetric encryption and symmetric encryption?

Asymmetric encryption uses the same key for encrypting or decrypting data

Symmetric encryption relies on a private key and public key

Asymmetric encryption is computationally slower than symmetric encryption

Symmetric encryption offers confidentality protection through private key encryption system

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following scenarios primarily benefits from using hashing?

A company needs to send confidential documents over an insecure network.

A website needs to securely store user login passwords.

A cloud provider wants to detect if malware has infected a virtual machine.

A user wants to ensure a downloaded software installer is the official version.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does hashing help ensure data integrity?

It makes the data unreadable without a specific decryption key.

It creates a unique fingerprint of the data that changes if the data is modified.

It compresses the data, making it smaller and harder to intercept.

It automatically creates backups of the data in case of corruption.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is digital signature?

A handwritten signature scanned into a computer system.

A series of random characters generated by a computer program.

A secure hash function applied to a digital document.

A photo of a person's signature attached to an electronic document.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Digital signature requires by combining

Hashing

Assymmetric encryption

Symmetric encryption

Encoding

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?