Network Security - Modules 15 – 17: Cryptography Group Exam

Network Security - Modules 15 – 17: Cryptography Group Exam

12th Grade

27 Qs

quiz-placeholder

Similar activities

MODUL 2 : IKON DAN FUNGSI DALAM MICROSOFT OFFICE WORD 2019

MODUL 2 : IKON DAN FUNGSI DALAM MICROSOFT OFFICE WORD 2019

KG - Professional Development

23 Qs

OCR Alevel - Networking Quiz

OCR Alevel - Networking Quiz

12th Grade

23 Qs

CompTIA Sec+ Chapter 3, 2nd Attempt Missed

CompTIA Sec+ Chapter 3, 2nd Attempt Missed

12th Grade

23 Qs

computer science

computer science

KG - Professional Development

23 Qs

Career Management Quiz 2.02

Career Management Quiz 2.02

9th - 12th Grade

25 Qs

Leccion Roblox Studio Smartcamp

Leccion Roblox Studio Smartcamp

9th - 12th Grade

22 Qs

ICT QUIZ!

ICT QUIZ!

10th - 12th Grade

25 Qs

CSAwesome Unit 1 Vocabulary

CSAwesome Unit 1 Vocabulary

10th - 12th Grade

23 Qs

Network Security - Modules 15 – 17: Cryptography Group Exam

Network Security - Modules 15 – 17: Cryptography Group Exam

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Kalei Cook

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

27 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. Which algorithm can ensure data integrity?

RSA

AES

MD5

PKI

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. What is the keyspace of an encryption algorithm?

  • the set of all possible values used to generate a key

  • the set of procedures used to calculate asymmetric keys

  • the set of hash functions used to generate a key

  • the mathematical equation that is used to create a key

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3. Alice and Bob are using a digital signature to sign a document. What key should Alice use to sign the document so that Bob can make sure that the document came from Alice?

  • private key from Bob

  • private key from Alice

  • public key from Bob

  • username and password from Alice

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

4. Which three security services are provided by digital signatures? (Choose three.)

  • provides nonrepudiation using HMAC functions

  • guarantees data has not changed in transit

  • provides data encryption

  • authenticates the source

  • provides confidentiality of digitally signed data

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5. What is another name for confidentiality of information?

  • consistency

trustworthiness

accuracy

privacy

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

6. As data is being stored on a local hard disk, which method would secure the data from unauthorized access?

  • a duplicate hard drive copy

  • deletion of sensitive files

  • two factor authentication

  • data encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7. What popular encryption algorithm requires that both the sender and receiver know a pre-shared key?

PKI

MD5

AES

HMAC

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?