
COMPTIA 02
Authored by Isabel Aguilar
Computers
12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
132 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
is a symmetric key block cipher that operates on 128-bit blocks and supports key sizes of 128, 192, and 256 bits.
Serpent
AWS
IDEA
RC4
ChaCha20
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
is a symmetric key block cipher that operates on 128-bit blocks and supports key sizes of 128, 192, and 256 bits. It is a joint development by NTT and Mitsubishi Electric Corporation.
Serpent
Camellia
IDEA
RC4
ChaCha20
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
is a symmetric key block cipher that operates on 64-bit blocks and supports key sizes of 128 bits.
Serpent
Camellia
IDEA
RC4
ChaCha20
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
is a stream cipher known for its simplicity and speed. It operates on variable-length keys and generates a keystream that is XORed with the plaintext to produce the ciphertext.
Serpent
Camellia
IDEA
RC4
ChaCha20
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Is a stream cipher that is widely used in applications such as TLS. It operates on 512-bit blocks and supports key sizes of 128, 256 bits.
Serpent
Camellia
IDEA
RC4
ChaCha20
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
is one of the most widely used asymmetric encryption algorithms. It relies on the difficulty of factoring large prime numbers. The algorithm generates a public-private key pair, where the public key is used for encryption, and the private key is used for decryption. is often employed in secure email communication, SSL/TLS protocols, digital signatures, and key exchange.
RSA
Diffie-Hellman (DH)
Elliptic Curve Cryptography (ECC):
Digital Signature Algorithm (DSA):
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
is a key exchange algorithm that allows two parties to establish a shared secret key over an insecure communication channel. It enables secure communication even if an eavesdropper intercepts the exchange. is used in various protocols such as SSL/TLS, IPsec, and secure email.
RSA
Diffie-Hellman (DH)
Elliptic Curve Cryptography (ECC):
Digital Signature Algorithm (DSA):
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade