Network Security - Modules 15 – 17: Cryptography Group Exam

Network Security - Modules 15 – 17: Cryptography Group Exam

12th Grade

27 Qs

quiz-placeholder

Similar activities

Search Algorithms

Search Algorithms

9th - 12th Grade

25 Qs

Computers

Computers

12th Grade

22 Qs

Setting a pc system vocab

Setting a pc system vocab

9th - 12th Grade

22 Qs

Quizizz HTML and CSS

Quizizz HTML and CSS

9th - 12th Grade

22 Qs

Adobe Illustrator Quiz Review

Adobe Illustrator Quiz Review

9th - 12th Grade

27 Qs

G9_Quiz1_2024_Database

G9_Quiz1_2024_Database

9th - 12th Grade

22 Qs

Network Security - Modules 15 – 17: Cryptography Group Exam

Network Security - Modules 15 – 17: Cryptography Group Exam

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Kalei Cook

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

27 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. Which algorithm can ensure data integrity?

RSA

AES

MD5

PKI

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. What is the keyspace of an encryption algorithm?

  • the set of all possible values used to generate a key

  • the set of procedures used to calculate asymmetric keys

  • the set of hash functions used to generate a key

  • the mathematical equation that is used to create a key

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3. Alice and Bob are using a digital signature to sign a document. What key should Alice use to sign the document so that Bob can make sure that the document came from Alice?

  • private key from Bob

  • private key from Alice

  • public key from Bob

  • username and password from Alice

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

4. Which three security services are provided by digital signatures? (Choose three.)

  • provides nonrepudiation using HMAC functions

  • guarantees data has not changed in transit

  • provides data encryption

  • authenticates the source

  • provides confidentiality of digitally signed data

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5. What is another name for confidentiality of information?

  • consistency

trustworthiness

accuracy

privacy

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

6. As data is being stored on a local hard disk, which method would secure the data from unauthorized access?

  • a duplicate hard drive copy

  • deletion of sensitive files

  • two factor authentication

  • data encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7. What popular encryption algorithm requires that both the sender and receiver know a pre-shared key?

PKI

MD5

AES

HMAC

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?