Cryptography

Cryptography

University

15 Qs

quiz-placeholder

Similar activities

Unit 2: Cryptography

Unit 2: Cryptography

University

20 Qs

Silhouette

Silhouette

University

10 Qs

Computer Platform

Computer Platform

University

20 Qs

INformation Security

INformation Security

University

15 Qs

Intro and Basics of Gen AI

Intro and Basics of Gen AI

University

10 Qs

CMT10103 GROUP 4

CMT10103 GROUP 4

University

15 Qs

Understanding Data Safety

Understanding Data Safety

8th Grade - University

15 Qs

Chap 19

Chap 19

University

15 Qs

 Cryptography

Cryptography

Assessment

Quiz

Other

University

Medium

Created by

ريوف الشريف

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of cryptography?

a) Compressing data

b) Protecting information

c) Speeding up communication

d) Storing files

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of encryption uses a single key for both encryption and decryption?

a) Symmetric encryption

b) Asymmetric encryption

c) Hashing

  • d) Digital signatures

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of encryption in messaging apps like WhatsApp?

a) Message compression

b) End-to-end encryption

c) Data storage

d) Message deletion

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is used to secure online payments?

a) FTP

b) HTTP

c) SSL/TLS

d) DNS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does hashing ensure?

a) Data confidentiality

b) Data integrity

c) Fast file transfer

d) Secure key exchange

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between symmetric and asymmetric encryption?

a) Symmetric uses two keys, while asymmetric uses one key.

b) Symmetric uses one key, while asymmetric uses a key pair.

c) Asymmetric is faster than symmetric encryption.

d) Symmetric is only used for small files.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Certificate Authority (CA) responsible for?

a) Generating keys

b) Issuing and managing digital certificates

c) Encrypting emails

d) Storing public keys

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?