Cryptography

Cryptography

Professional Development

20 Qs

quiz-placeholder

Similar activities

History of the Buffalo Bills

History of the Buffalo Bills

Professional Development

20 Qs

Technology, Society, and Muslim Contributions

Technology, Society, and Muslim Contributions

Professional Development

21 Qs

ECS Midterm 1 (2023)

ECS Midterm 1 (2023)

Professional Development

25 Qs

Sistem Ordering 2025

Sistem Ordering 2025

Professional Development

20 Qs

SBUR CL7 QE3 SY2024-25

SBUR CL7 QE3 SY2024-25

Professional Development

20 Qs

Power BI 1 Quiz

Power BI 1 Quiz

Professional Development

15 Qs

PC1 REVIEW Quiz 2 2e

PC1 REVIEW Quiz 2 2e

Professional Development

15 Qs

AWS 10 Cloud Journey

AWS 10 Cloud Journey

Professional Development

20 Qs

Cryptography

Cryptography

Assessment

Quiz

others

Professional Development

Medium

Created by

Ruth Fatayo

Used 9+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of turning ciphertext back into plaintext using a key?
Decryption
Encryption
Hashing
Authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of hashing functions in cryptography?
To encrypt data
To ensure data integrity
To exchange keys securely
To authenticate users

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption method uses a pair of keys, one public and one private, to secure data?
Symmetric encryption
One-time pad encryption
Asymmetric encryption
Two-key encryption

4.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Encryption transforms readable data, known as _______, into an unreadable format called ciphertext.

5.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

In an asymmetric communication between 6 people, how many keys do you need to communicate

6.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

In a private key cryptographic communication, how many keys do you need to communicate between 2 people

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for the process of transforming plaintext into ciphertext using a cryptographic algorithm?
Decryption
Hashing
Encryption
Authentication

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?