Chapter 21.2 Cryptography

Chapter 21.2 Cryptography

12th Grade

15 Qs

quiz-placeholder

Similar activities

Encryption - AQA A Level Computer Science

Encryption - AQA A Level Computer Science

11th - 12th Grade

10 Qs

Activity 2.1.2 Encyrption: Keep it Confidential

Activity 2.1.2 Encyrption: Keep it Confidential

9th - 12th Grade

11 Qs

APCSP 2.1.1 - 2.1.3 Review

APCSP 2.1.1 - 2.1.3 Review

9th - 12th Grade

15 Qs

Encryption, Compression & Hashing

Encryption, Compression & Hashing

12th Grade

19 Qs

Encryption and Caesar Cipher Quiz

Encryption and Caesar Cipher Quiz

9th - 12th Grade

15 Qs

Unit 17 Encryption and Security Quiz

Unit 17 Encryption and Security Quiz

12th Grade

10 Qs

Security

Security

12th Grade - University

12 Qs

Cybersecurity Fundamentals Week 4 Quiz

Cybersecurity Fundamentals Week 4 Quiz

KG - University

10 Qs

Chapter 21.2 Cryptography

Chapter 21.2 Cryptography

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Ann Watterson

Used 3+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption algorithm is considered a legacy algorithm and should be avoided?

AES

DES

RSA

3DES

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between asymmetric and symmetric encryption?

The type of data they encrypt

The way they use keys

The speed of encryption

The level of security

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the two types of cipher modes in symmetric encryption?

Block cipher and stream cipher

Public cipher and private cipher

Open cipher and closed cipher

Fast cipher and slow cipher

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption algorithm is based on the premise that each communicating party knows the pre-shared key?

Asymmetric encryption

Symmetric encryption

Public key infrastructure

Digital signature

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What infrastructure is associated with asymmetric encryption?

Public key infrastructure (PKI)

Private key infrastructure (PKI)

Digital infrastructure (DI)

Secure infrastructure (SI)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should be used to ensure more secure communications in symmetric encryption?

A shorter key

A longer key

A public key

A digital signature

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption algorithm offers combinations of 128-, 192-, or 256-bit keys?

DES

3DES

AES

SEAL

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?