Cryptography

Cryptography

University

10 Qs

quiz-placeholder

Similar activities

Unit 10 - Internet Security

Unit 10 - Internet Security

12th Grade - University

13 Qs

Cryptography

Cryptography

University

15 Qs

CNET151 Chapt 8 Encryption

CNET151 Chapt 8 Encryption

University

15 Qs

Unit 10 Cybersecurity CSP

Unit 10 Cybersecurity CSP

12th Grade - University

13 Qs

Quiz 1

Quiz 1

University

11 Qs

ITBP301_Chapter 04

ITBP301_Chapter 04

University

10 Qs

Chapter 6 (Fundamentals of Cybersecurity

Chapter 6 (Fundamentals of Cybersecurity

University

10 Qs

iGCSE Cryptography (2023 onwards)

iGCSE Cryptography (2023 onwards)

9th Grade - University

10 Qs

Cryptography

Cryptography

Assessment

Quiz

Computers

University

Medium

Created by

Subba Chavva

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes cryptography?

The process of storing data in multiple places for security

A technique for speeding up data transfer rates

A method for generating random numbers

The science of transforming information to prevent unauthorized access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Data Encryption Standard (DES) operates on which of the following block sizes?

32 bits

64 bits

128 bits

256 bits

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Advanced Encryption Standard (AES) uses which of the following key sizes?

92, 224, and 256 bits

64, 96, and 128 bits

128, 192, and 256 bits

56, 64, and 128 bits

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In RSA encryption, what are the two main keys involved in the process?

Symmetric and asymmetric keys

Public key and private key

Shared key and session key

Private key and secret key

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of firewall filters traffic based on IP addresses and ports?

Packet-filtering firewall

Proxy firewall

ext-generation firewall

Stateful inspection firewall

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements is true about symmetric-key cryptography?

It is primarily used for digital signatures.

It is slower than public-key cryptography for large datasets.

It requires a public and private key pair.

It is generally faster than public-key cryptography.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many rounds of encryption does the DES algorithm use?

8

16

12

10

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?