Cryptography Basics Quiz

Cryptography Basics Quiz

11th Grade

11 Qs

quiz-placeholder

Similar activities

Cryptography

Cryptography

9th - 12th Grade

15 Qs

SECURITY BASICS AND IT PROFESSIONAL (SECURITY POLICIES)

SECURITY BASICS AND IT PROFESSIONAL (SECURITY POLICIES)

9th - 12th Grade

12 Qs

IBA Chapter 8B

IBA Chapter 8B

8th - 12th Grade

16 Qs

CSP 2.1.5 Secure Protocols

CSP 2.1.5 Secure Protocols

9th - 12th Grade

13 Qs

[AP CSP] Cryptography and Ciphers

[AP CSP] Cryptography and Ciphers

9th - 12th Grade

15 Qs

Computer Security:Encryption

Computer Security:Encryption

10th Grade - University

10 Qs

Cryptology

Cryptology

9th Grade - University

15 Qs

J277 - Wireless Networks

J277 - Wireless Networks

8th - 11th Grade

11 Qs

Cryptography Basics Quiz

Cryptography Basics Quiz

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Tommy Mcelvanney

Used 1+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of cryptographic salts?

To encrypt messages using a public key

To enhance security by adding randomness to passwords before hashing

To compress data before encryption

To verify the integrity of data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a computational assumption used in cryptography?

Computational ease assumption

Computational hardness assumption

Computational simplicity assumption

Computational transparency assumption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a one-time pad use to ensure security?

A digital signature

A randomly generated key that is as long as the message

A fixed key that is reused across messages

A symmetric encryption algorithm

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a symmetric key cipher?

Public key cryptography

Hash function

AES

RSA

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is reliant on the mathematical principles of cryptography?

Computational hardness assumption

Encryption algorithms

Legal and ethical issues

Cryptographic primitives

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What role does asymmetric encryption play in digital signatures?

To verify the sender's identity and ensure data integrity

To encrypt the entire message for confidentiality

To increase the speed of the encryption process

To compress the data before encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which algorithm is commonly used for secure hash functions?

RSA

SHA-256

AES

ECDSA

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?