Cryptography Quiz

Cryptography Quiz

12th Grade

14 Qs

quiz-placeholder

Similar activities

Network terminology

Network terminology

12th Grade

10 Qs

Ceaser Cipher, Atbash Cipher, and Rot13 cipher

Ceaser Cipher, Atbash Cipher, and Rot13 cipher

12th Grade - University

15 Qs

Encryption and Caesar Cipher Quiz

Encryption and Caesar Cipher Quiz

9th - 12th Grade

15 Qs

Encryption - AQA A Level Computer Science

Encryption - AQA A Level Computer Science

11th - 12th Grade

10 Qs

1.3.1 - Encryption & Hashing

1.3.1 - Encryption & Hashing

8th - 12th Grade

13 Qs

AP CSP Unit 2 Ch 2

AP CSP Unit 2 Ch 2

9th - 12th Grade

19 Qs

Encryption, Compression & Hashing

Encryption, Compression & Hashing

12th Grade

19 Qs

2.6 Encryption

2.6 Encryption

9th Grade - University

9 Qs

Cryptography Quiz

Cryptography Quiz

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Dr. J

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of cryptography?

To ensure security of communication

To create complex algorithms

To monitor traffic flows

To store data securely

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does confidentiality in secure communication refer to?

Data integrity

Privacy and secrecy

Authentication

Availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attacker can eavesdrop on communication?

Innocent bystander

Active attacker

Passive attacker

Malicious attacker

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a characteristic of symmetric encryption?

Uses two different keys

Uses the same key for encryption and decryption

Is slower than asymmetric encryption

Does not require a key

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the key length for a typical symmetric encryption algorithm?

512 bits

256 bits

128 bits

16 bits

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cipher is an example of a substitution cipher?

Caesar Cipher

Blowfish

AES

RSA

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term 'non-repudiation' mean in information security?

Only the sender can read the message

Data is always available

An entity cannot deny its previous actions

Data can be accessed by anyone

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers