Search Header Logo

Crypt

Authored by Hisquare Group

Computers

Professional Development

Used 1+ times

Crypt
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Text which has been encrypted will be referred to as

Plaintext

Ciphertext

Decrypted text

Algorithm

2.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

How many keys are involved in symmetric encryption?

1

2

3

4

3.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

How many keys are involved in assymmetric encryption?

1

2

3

4

4.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Ceasar's cypher is an example of

DES

AES

Substitution cypher

Assymetric encryption

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Select all that applies: At which point in the process of cryptography do you need keys?

Encryption

Decryption

Breaking the code

Creating the algorithm

6.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Which of the CIA triad is LEAST affected by encryption?

Confidentiality

Integrity

Availability

7.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

DES and AES are both examples of

Symmetric encryption

Assymetric encryption

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?