
Cryptography
Authored by Ruth Fatayo
others
Professional Development
Used 11+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the process of turning ciphertext back into plaintext using a key?
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of hashing functions in cryptography?
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which encryption method uses a pair of keys, one public and one private, to secure data?
4.
FILL IN THE BLANKS QUESTION
30 sec • 1 pt
Encryption transforms readable data, known as (a) , into an unreadable format called ciphertext.
5.
FILL IN THE BLANKS QUESTION
30 sec • 1 pt
In an asymmetric communication between 6 people, how many keys do you need to communicate
(a)
6.
FILL IN THE BLANKS QUESTION
30 sec • 1 pt
In a private key cryptographic communication, how many keys do you need to communicate between 2 people
(a)
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term for the process of transforming plaintext into ciphertext using a cryptographic algorithm?
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?