cryptography

cryptography

Professional Development

25 Qs

quiz-placeholder

Similar activities

GDPR Multiple-Choice Questions

GDPR Multiple-Choice Questions

Professional Development

20 Qs

CCNA Practice Test

CCNA Practice Test

Professional Development

25 Qs

Network+ 802.11, cellular, vpn

Network+ 802.11, cellular, vpn

Professional Development

23 Qs

Review DAPODIK SMK

Review DAPODIK SMK

Professional Development

20 Qs

Fun Quiz Basic Engineer

Fun Quiz Basic Engineer

Professional Development

20 Qs

Networking Quiz

Networking Quiz

Professional Development

20 Qs

Cyber Security livello 2

Cyber Security livello 2

Professional Development

20 Qs

Schott_Day_1

Schott_Day_1

Professional Development

20 Qs

cryptography

cryptography

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

22DI03 D

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term "key exchange" mean in cryptography?

Sharing of encrypted data

Sharing of cryptographic keys between parties

Swapping public keys for private keys

Changing encryption algorithms during communication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following ensures confidentiality of a message?

Hashing

Encryption

Digital signatures

Salting

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In symmetric encryption, the same key is used for:

Encryption only

Decryption only

Both encryption and decryption

Key generation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a message authentication code (MAC)?

Encrypt data

Authenticate the sender and verify integrity

Create digital certificates

Generate random keys

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a primary characteristic of a one-way hash function?

It can be reversed to obtain the original data

It produces fixed-length output for variable-length input

It uses symmetric keys

It requires high computational power

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a characteristic of public-key cryptography?

Scalability

Secure key distribution

High speed

Asymmetry

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a weakness of symmetric key cryptography?

Key distribution

Complexity of the algorithm

Low speed

High storage requirements

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?