cryptography

cryptography

Professional Development

25 Qs

quiz-placeholder

Similar activities

Network Switch and VLAN Quiz

Network Switch and VLAN Quiz

Professional Development

21 Qs

5 DAYS TRAINING UNDER CYBER SHAKTI P[ROJECT FOR WOMEN OFFICAILS

5 DAYS TRAINING UNDER CYBER SHAKTI P[ROJECT FOR WOMEN OFFICAILS

Professional Development

20 Qs

Topic 1 Question 500 to 520

Topic 1 Question 500 to 520

Professional Development

20 Qs

Topic 1 Question 201 to 220

Topic 1 Question 201 to 220

Professional Development

20 Qs

AZ-500 Final quiz GSI

AZ-500 Final quiz GSI

Professional Development

24 Qs

Understanding Computers and Networking

Understanding Computers and Networking

Professional Development

20 Qs

Exam Prep 2

Exam Prep 2

Professional Development

20 Qs

Networking and Routing Quiz 1

Networking and Routing Quiz 1

Professional Development

23 Qs

cryptography

cryptography

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

22DI03 D

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term "key exchange" mean in cryptography?

Sharing of encrypted data

Sharing of cryptographic keys between parties

Swapping public keys for private keys

Changing encryption algorithms during communication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following ensures confidentiality of a message?

Hashing

Encryption

Digital signatures

Salting

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In symmetric encryption, the same key is used for:

Encryption only

Decryption only

Both encryption and decryption

Key generation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a message authentication code (MAC)?

Encrypt data

Authenticate the sender and verify integrity

Create digital certificates

Generate random keys

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a primary characteristic of a one-way hash function?

It can be reversed to obtain the original data

It produces fixed-length output for variable-length input

It uses symmetric keys

It requires high computational power

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a characteristic of public-key cryptography?

Scalability

Secure key distribution

High speed

Asymmetry

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a weakness of symmetric key cryptography?

Key distribution

Complexity of the algorithm

Low speed

High storage requirements

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?