CH3 security

CH3 security

University

7 Qs

quiz-placeholder

Similar activities

Linux Core Directories

Linux Core Directories

11th Grade - University

9 Qs

NAT-Q

NAT-Q

9th Grade - University

11 Qs

Introducción a la asignatura recolección y preservación

Introducción a la asignatura recolección y preservación

University

8 Qs

Encryption Modes Quiz

Encryption Modes Quiz

University

5 Qs

CMC Career Fair 2025 - Q1

CMC Career Fair 2025 - Q1

University

10 Qs

SIMPLE AZURE

SIMPLE AZURE

University

9 Qs

Round 3

Round 3

University

10 Qs

 Chapter 5 Database Management Quiz

Chapter 5 Database Management Quiz

University

10 Qs

CH3 security

CH3 security

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Rodah Alkaabi

Used 2+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is symmetric encryption also known as?

  • A) Public-key encryption

  • B) Asymmetric encryption

  • C) Single-key encryption

D) Hash encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an ingredient in symmetric encryption?

Plaintext

  • Public key

Secret key

Ciphertext

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Feistel cipher structure primarily associated with?

AES

RSA

DES

MD5

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which algorithm is considered a variation of the Feistel network?

AES

DES

RC4

MD5

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What key length is NOT used in AES?

  • A) 128-bit

  • B) 192-bit

  • C) 256-bit

D) 512-bit

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following modes of operation is NOT part of symmetric encryption?

  • A) ECB

  • B) CBC

  • C) RSA

  • D) CTR

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the Initialization Vector (IV) in the Cipher Block Chaining (CBC) mode?

  • A) To encrypt plaintext

  • B) To generate the secret key

  • C) To ensure unique ciphertext for repeated plaintext blocks

  • D) To calculate hash values