Search Header Logo

Cryptography

Authored by Ruth Fatayo

others

Professional Development

Used 10+ times

Cryptography
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of turning ciphertext back into plaintext using a key?

Decryption
Encryption
Hashing
Authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of hashing functions in cryptography?

To encrypt data
To ensure data integrity
To exchange keys securely
To authenticate users

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption method uses a pair of keys, one public and one private, to secure data?

Symmetric encryption
One-time pad encryption
Asymmetric encryption
Two-key encryption

4.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Encryption transforms readable data, known as _______, into an unreadable format called ciphertext.

5.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

In an asymmetric communication between 6 people, how many keys do you need to communicate

6.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

In a private key cryptographic communication, how many keys do you need to communicate between 2 people

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for the process of transforming plaintext into ciphertext using a cryptographic algorithm?

Decryption
Hashing
Encryption
Authentication

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?