Chapter 21.2 Cryptography

Chapter 21.2 Cryptography

12th Grade

15 Qs

quiz-placeholder

Similar activities

2.3.1 Graph Traversal & Path Finding Algorithms

2.3.1 Graph Traversal & Path Finding Algorithms

12th Grade - University

20 Qs

Problem Solving : Design Solution

Problem Solving : Design Solution

12th Grade

15 Qs

Flowol

Flowol

KG - University

10 Qs

Security and Ethics

Security and Ethics

9th - 12th Grade

17 Qs

IT Quiz

IT Quiz

11th - 12th Grade

10 Qs

ITGS - IT Systems (Hardware)

ITGS - IT Systems (Hardware)

10th - 12th Grade

14 Qs

[Lớp 12] Access - Ôn tập

[Lớp 12] Access - Ôn tập

12th Grade

14 Qs

Computer Security Measure

Computer Security Measure

11th Grade - University

19 Qs

Chapter 21.2 Cryptography

Chapter 21.2 Cryptography

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Ann Watterson

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption algorithm is considered a legacy algorithm and should be avoided?

AES

DES

RSA

3DES

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between asymmetric and symmetric encryption?

The type of data they encrypt

The way they use keys

The speed of encryption

The level of security

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the two types of cipher modes in symmetric encryption?

Block cipher and stream cipher

Public cipher and private cipher

Open cipher and closed cipher

Fast cipher and slow cipher

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption algorithm is based on the premise that each communicating party knows the pre-shared key?

Asymmetric encryption

Symmetric encryption

Public key infrastructure

Digital signature

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What infrastructure is associated with asymmetric encryption?

Public key infrastructure (PKI)

Private key infrastructure (PKI)

Digital infrastructure (DI)

Secure infrastructure (SI)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should be used to ensure more secure communications in symmetric encryption?

A shorter key

A longer key

A public key

A digital signature

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption algorithm offers combinations of 128-, 192-, or 256-bit keys?

DES

3DES

AES

SEAL

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers