Search Header Logo

Mock Test

Authored by Roja Ahmadi

Computers

University

Used 1+ times

Mock Test
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

27 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following encryption methods uses a public and private key pair?

AES

RSA

DES

MD5

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is not a characteristic of a secure hash function?

One-way

Reversible

Collision-resistant

Deterministic

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the primary drawback of symmetric encryption compared to asymmetric encryption?

It requires longer key lengths for security

It uses separate keys for encryption and decryption

Securely sharing the key is challenging

It is computationally slower

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following best describes a brute force attack?

Exploiting software vulnerabilities to bypass encryption

Attempting all possible key combinations to decrypt data

Intercepting encrypted messages to analyse patterns

Using a mathematical flaw in an algorithm to break encryption

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Why is computational complexity important in the context of cryptography?

It ensures that cryptographic algorithms are easy to implement and fast to execute.

It provides a measure of how difficult it is for an attacker to break the encryption using computational resources.

It ensures that cryptographic keys can be reused multiple times without compromising security.

It determines the randomness of the encrypted output to make it unreadable.

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which cryptographic principle is compromised in a Man-in-the-Middle (MITM) attack?

Confidentiality

Integrity

Authentication

All of the above

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following best practices would enhance the security of symmetric key management?

Use key wrapping to encrypt keys before storing them

Use the same key for encryption and decryption indefinitely

Rely solely on password-protected access to the keys

Rotate symmetric keys only when a breach is suspected

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers