
cryptography
Authored by 22DI03 D
Information Technology (IT)
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the term "key exchange" mean in cryptography?
Sharing of encrypted data
Sharing of cryptographic keys between parties
Swapping public keys for private keys
Changing encryption algorithms during communication
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following ensures confidentiality of a message?
Hashing
Encryption
Digital signatures
Salting
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In symmetric encryption, the same key is used for:
Encryption only
Decryption only
Both encryption and decryption
Key generation
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of a message authentication code (MAC)?
Encrypt data
Authenticate the sender and verify integrity
Create digital certificates
Generate random keys
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a primary characteristic of a one-way hash function?
It can be reversed to obtain the original data
It produces fixed-length output for variable-length input
It uses symmetric keys
It requires high computational power
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a characteristic of public-key cryptography?
Scalability
Secure key distribution
High speed
Asymmetry
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a weakness of symmetric key cryptography?
Key distribution
Complexity of the algorithm
Low speed
High storage requirements
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?