CRYPTOGRAPHY

CRYPTOGRAPHY

University

10 Qs

quiz-placeholder

Similar activities

Quiz: SNS-UNIT-IV-Predicting Human Behaviour and Privacy Issues

Quiz: SNS-UNIT-IV-Predicting Human Behaviour and Privacy Issues

University

10 Qs

Engineering Professional Bodies & Ethics

Engineering Professional Bodies & Ethics

University

10 Qs

19RO2015 - Neural Networks and Fuzzy Systems - Quiz 1

19RO2015 - Neural Networks and Fuzzy Systems - Quiz 1

University

15 Qs

AI BASED CREATIVE QUIZ

AI BASED CREATIVE QUIZ

University

10 Qs

Distillation

Distillation

University

12 Qs

unit1 MCQ

unit1 MCQ

University

15 Qs

Deep Learning

Deep Learning

University

10 Qs

Manajemen Industri IT Quiz 1

Manajemen Industri IT Quiz 1

University

14 Qs

CRYPTOGRAPHY

CRYPTOGRAPHY

Assessment

Quiz

Engineering

University

Medium

Created by

Saranya K

Used 21+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cryptography, what is cipher?

algorithm for performing encryption and decryption

encrypted message

both algorithm for performing encryption and decryption and encrypted message

decrypted message

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In asymmetric key cryptography, the private key is kept by __________

sender

receiver

sender and receiver

all the connected devices to the network

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following algorithm is not used in asymmetric-key cryptography?

rsa algorithm

diffie-hellman algorithm

electronic code book algorithm

dsa algorithm

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cryptography, the order of the letters in a message is rearranged by __________

transpositional ciphers

substitution ciphers

both transpositional ciphers and substitution ciphers

quadratic ciphers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is data encryption standard (DES)?

block cipher

stream cipher

bit cipher

byte cipher

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cryptanalysis is used __________

to find some insecurity in a cryptographic scheme

to increase the speed

to encrypt the data

to make new ciphers

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is a cryptographic protocol used to secure HTTP connection?

stream control transmission protocol (SCTP)

transport layer security (TLS)

explicit congestion notification (ECN)

resource reservation protocol

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?