Search Header Logo

Understanding PGP Services

Authored by Dr. L

Engineering

University

Used 1+ times

Understanding PGP Services
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

What are the five services that PGP consists of?

Authentication

Confidentiality

Compression

E-mail compatibility

Segmentation

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What hash function is used for authentication in PGP?

SHA-1

MD5

SHA-256

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

What encryption methods are used for confidentiality in PGP?

CAST-128

IDEA

3DES

AES

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the maximum length of a message in PGP?

50,000 octets

100,000 octets

200,000 octets

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

What types of keys does PGP make use of?

One-time session symmetric keys

Public keys

Private keys

Passphrase based symmetric keys

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

What fields are present in the private key ring?

Key ID

Timestamp

Public key

Encrypted private key

User ID

7.

WORD CLOUD QUESTION

1 min • Ungraded

Which algorithms are used for message encryption?

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?