
Cryptography
Authored by Ruth Fatayo
others
Professional Development
Used 10+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the process of turning ciphertext back into plaintext using a key?
Decryption
Encryption
Hashing
Authentication
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of hashing functions in cryptography?
To encrypt data
To ensure data integrity
To exchange keys securely
To authenticate users
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which encryption method uses a pair of keys, one public and one private, to secure data?
Symmetric encryption
One-time pad encryption
Asymmetric encryption
Two-key encryption
4.
FILL IN THE BLANK QUESTION
30 sec • 1 pt
Encryption transforms readable data, known as _______, into an unreadable format called ciphertext.
5.
FILL IN THE BLANK QUESTION
30 sec • 1 pt
In an asymmetric communication between 6 people, how many keys do you need to communicate
6.
FILL IN THE BLANK QUESTION
30 sec • 1 pt
In a private key cryptographic communication, how many keys do you need to communicate between 2 people
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term for the process of transforming plaintext into ciphertext using a cryptographic algorithm?
Decryption
Hashing
Encryption
Authentication
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?