

Digital Signatures and Hash Functions
Interactive Video
•
Computers
•
10th - 12th Grade
•
Practice Problem
•
Medium
Amelia Wright
Used 5+ times
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one of the key foundations of cryptography?
Ensuring data is encrypted
Ensuring data is compressed
Ensuring data origin can be verified
Ensuring data is deleted
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does proof of integrity ensure?
Data is deleted
Data is consistent and unchanged
Data is compressed
Data is encrypted
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a hash often referred to as?
A digital signature
A public key
A data packet
A message digest
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What happens if a single character in a file is changed?
The hash changes
The hash remains the same
The file becomes unreadable
The file size changes
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What additional level of integrity can be added to proof of integrity?
Proof of compression
Proof of origin
Proof of deletion
Proof of encryption
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is used to provide non-repudiation in digital signatures?
A message digest
A hash
A private key
A public key
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does Alice use to encrypt the hash in the digital signature process?
Alice's public key
Alice's private key
Bob's private key
Bob's public key
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?