
Cryptography
Authored by Laxmi Jadhav
Professional Development
University
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
17 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Symmetric encryption is also known as
public key encryption
Asymmetrickey encryption
Conventional Encryption
Hybrid encryption
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Digital signature cannot provide following information
Authentication
Nonrepudiation
Confidentiality
integrity
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Encryption is used primarilly with
transition entry
computer processing
file retention
data communication
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
which of the following process converts cipher text to plain text
Hashing
substitution
Encryption
Decryption
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
MD5 is widely used hash function for producing Hash value of
256 bits
128 bits
1024 bits
64 bits
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the key size of Data encryption Algorithim used in cryptography
64 bits
128 bits
56 bits
1024 bits
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In cryptography the order of letters in message is rearranged by
transpositional cipher
substitution cipher
Both A and B
None Above
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?