Chapter 21.1 Quiz

Chapter 21.1 Quiz

12th Grade

15 Qs

quiz-placeholder

Similar activities

Cybersecurity Fundamentals Week 4 Quiz

Cybersecurity Fundamentals Week 4 Quiz

KG - University

10 Qs

Questionário 001 - Home-Office & VPNs

Questionário 001 - Home-Office & VPNs

1st - 12th Grade

14 Qs

Induction Unit 7 Assessment

Induction Unit 7 Assessment

12th Grade

20 Qs

Encryption - AQA A Level Computer Science

Encryption - AQA A Level Computer Science

11th - 12th Grade

10 Qs

Data Structures

Data Structures

10th Grade - University

18 Qs

Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

9th - 12th Grade

16 Qs

A level CIE Security

A level CIE Security

10th - 12th Grade

12 Qs

Hashing Quiz

Hashing Quiz

12th Grade

15 Qs

Chapter 21.1 Quiz

Chapter 21.1 Quiz

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Ann Watterson

Used 3+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which element of secure communication ensures only authorized users can read the message?

Data Integrity

Origin Authentication

Data Confidentiality

Data Non-Repudiation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of data non-repudiation?

To encrypt the message

To ensure the message was not altered

To prevent the sender from denying the message

To verify the sender's identity

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary use of cryptography in data communication?

To compress data

To encrypt data

To store data

To delete data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the analogy used to describe a one-way function in hashing?

Grinding coffee beans

Boiling water

Melting ice

Baking bread

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the result of a hash function called?

Message digest

Encryption key

Data packet

Compression code

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a cryptographic hash function?

To encrypt data

To compress data

To ensure data integrity

To generate random numbers

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which equation is used to explain how a hash algorithm operates?

h = H(x)

h = x + H

H = h(x)

x = H(h)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?