Cryptography and Security Quiz

Cryptography and Security Quiz

University

33 Qs

quiz-placeholder

Similar activities

Network Security 3

Network Security 3

University

32 Qs

Cryptographic Cybersec

Cryptographic Cybersec

University

32 Qs

Aspek Keamanan Sistem

Aspek Keamanan Sistem

University

32 Qs

FIREWALL ️‍🔥

FIREWALL ️‍🔥

University

30 Qs

Year 9 End of Term Quiz

Year 9 End of Term Quiz

8th Grade - University

28 Qs

Security Architecture Course Exam Two

Security Architecture Course Exam Two

University

33 Qs

City and Guilds Award in Mobile and Operating System

City and Guilds Award in Mobile and Operating System

12th Grade - Professional Development

30 Qs

 IAS 2 Security Architecture and Design Quiz 3

IAS 2 Security Architecture and Design Quiz 3

University

35 Qs

Cryptography and Security Quiz

Cryptography and Security Quiz

Assessment

Quiz

Computers

University

Easy

Created by

Trung Chi

Used 1+ times

FREE Resource

33 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an asymmetric encryption algorithm?

AES

RSA

DES

Blowfish

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a digital signature in cryptography?

To verify the authenticity and integrity of a message

To encrypt the message content

To ensure confidentiality of the data

To provide a hash value for the message

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which algorithm is used in the SSL/TLS protocols for securing communications over the internet?

RSA

AES

SHA-256

DES

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key difference between symmetric and asymmetric encryption?

Symmetric uses two keys, and asymmetric uses one key.

Symmetric encryption is slower than asymmetric encryption.

Symmetric encryption uses the same key for both encryption and decryption.

Asymmetric encryption is faster and more efficient.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following hashing algorithms is commonly used in blockchain technology?

MD5

SHA-256

AES

RSA

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term "salt" refer to in cryptographic hash functions?

A random value added to input before hashing to ensure uniqueness

A secret key used for encryption

A method to increase the length of the hash

A protocol used to encrypt the hash

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocols ensures secure communication over a network?

FTP

HTTPS

SMTP

SNMP

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?