Cryptography Quiz

Cryptography Quiz

Professional Development

40 Qs

quiz-placeholder

Similar activities

Network Fundamentals Knowledge Check Pt2 Batch 50

Network Fundamentals Knowledge Check Pt2 Batch 50

Professional Development

41 Qs

Mock Check Your Understanding

Mock Check Your Understanding

Professional Development

40 Qs

CCST - Networking

CCST - Networking

Professional Development

45 Qs

KSS QUIZ

KSS QUIZ

Professional Development

45 Qs

MeshChain AI Quiz (Tiếng Việt)

MeshChain AI Quiz (Tiếng Việt)

Professional Development

38 Qs

CCSA-4

CCSA-4

Professional Development

35 Qs

Đề thi an toàn mạng

Đề thi an toàn mạng

Professional Development

45 Qs

Cryptography Quiz

Cryptography Quiz

Assessment

Quiz

Information Technology (IT)

Professional Development

Medium

Created by

Jae K

Used 8+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alec wants to send Becky an encrypted message using asymmetric encryption.

What does Alec encrypt the message with?

Alec's private key

Becky's private key

Alec's public key

Becky's public key

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Stella sends Priscilla an encrypted message using asymmetric keys.

Which key is used to verify Stella's message?

Stella's public key

Priscilla's public key

Stella's private key

Priscilla's private key

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which block cipher mode converts the block cipher into a self-synchronizing stream cipher?

CFB

OFB

EFB

CTR

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which block cipher mode converts the block cipher to a synchronous stream output?

CFB

OFB

ECB

CTR

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

In asymmetric encryption, which key is used to encrypt the data?

Private key

Symmetric key

Public key

Session key

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which type of encryption is the same key used to encrypt and decrypt data?

public

asymmetric

symmetric

private

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What alternative term can be used to describe asymmetric cryptographic algorithms?

public key cryptography

user key cryptography

private key cryptography

cipher-text cryptography

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?