
Cryptography Quiz
Authored by Jae K
Information Technology (IT)
Professional Development
Used 8+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Alec wants to send Becky an encrypted message using asymmetric encryption.
What does Alec encrypt the message with?
Alec's private key
Becky's private key
Alec's public key
Becky's public key
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Stella sends Priscilla an encrypted message using asymmetric keys.
Which key is used to verify Stella's message?
Stella's public key
Priscilla's public key
Stella's private key
Priscilla's private key
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which block cipher mode converts the block cipher into a self-synchronizing stream cipher?
CFB
OFB
EFB
CTR
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which block cipher mode converts the block cipher to a synchronous stream output?
CFB
OFB
ECB
CTR
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
In asymmetric encryption, which key is used to encrypt the data?
Private key
Symmetric key
Public key
Session key
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In which type of encryption is the same key used to encrypt and decrypt data?
public
asymmetric
symmetric
private
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What alternative term can be used to describe asymmetric cryptographic algorithms?
public key cryptography
user key cryptography
private key cryptography
cipher-text cryptography
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?