cryptography

cryptography

Professional Development

25 Qs

quiz-placeholder

Similar activities

Interns'25 quiz Infosec

Interns'25 quiz Infosec

Professional Development

20 Qs

Chapter 5: Reconnaissance and Intelligence Gathering

Chapter 5: Reconnaissance and Intelligence Gathering

Professional Development

20 Qs

2Week VirtualTraining on Cyber Security for Women Govt Officials

2Week VirtualTraining on Cyber Security for Women Govt Officials

Professional Development

20 Qs

Cybersecurity and IT Infrastructure Quiz

Cybersecurity and IT Infrastructure Quiz

Professional Development

20 Qs

Chapter 3: Malicious Activity

Chapter 3: Malicious Activity

Professional Development

20 Qs

Securing Devices and Data

Securing Devices and Data

Professional Development

30 Qs

Network Switch and VLAN Quiz

Network Switch and VLAN Quiz

Professional Development

21 Qs

Quizz Segurança e conformidade AWS

Quizz Segurança e conformidade AWS

Professional Development

25 Qs

cryptography

cryptography

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

22DI03 D

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term "key exchange" mean in cryptography?

Sharing of encrypted data

Sharing of cryptographic keys between parties

Swapping public keys for private keys

Changing encryption algorithms during communication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following ensures confidentiality of a message?

Hashing

Encryption

Digital signatures

Salting

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In symmetric encryption, the same key is used for:

Encryption only

Decryption only

Both encryption and decryption

Key generation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a message authentication code (MAC)?

Encrypt data

Authenticate the sender and verify integrity

Create digital certificates

Generate random keys

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a primary characteristic of a one-way hash function?

It can be reversed to obtain the original data

It produces fixed-length output for variable-length input

It uses symmetric keys

It requires high computational power

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a characteristic of public-key cryptography?

Scalability

Secure key distribution

High speed

Asymmetry

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a weakness of symmetric key cryptography?

Key distribution

Complexity of the algorithm

Low speed

High storage requirements

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?