CRYPTOGRAPHY

CRYPTOGRAPHY

University

10 Qs

quiz-placeholder

Similar activities

Module 4: Quiz 2 Gururaj Surampalli

Module 4: Quiz 2 Gururaj Surampalli

University

10 Qs

Pre Test

Pre Test

University

12 Qs

Decision tree learning

Decision tree learning

University

10 Qs

Understanding Hash Functions and Signatures

Understanding Hash Functions and Signatures

University

10 Qs

CNS Quiz

CNS Quiz

University

15 Qs

Data Science Quizz

Data Science Quizz

University

14 Qs

Fuzzy Logic Quiz

Fuzzy Logic Quiz

University

10 Qs

Latihan Soal

Latihan Soal

University

10 Qs

CRYPTOGRAPHY

CRYPTOGRAPHY

Assessment

Quiz

Engineering

University

Medium

Created by

Saranya K

Used 21+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cryptography, what is cipher?

algorithm for performing encryption and decryption

encrypted message

both algorithm for performing encryption and decryption and encrypted message

decrypted message

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In asymmetric key cryptography, the private key is kept by __________

sender

receiver

sender and receiver

all the connected devices to the network

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following algorithm is not used in asymmetric-key cryptography?

rsa algorithm

diffie-hellman algorithm

electronic code book algorithm

dsa algorithm

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cryptography, the order of the letters in a message is rearranged by __________

transpositional ciphers

substitution ciphers

both transpositional ciphers and substitution ciphers

quadratic ciphers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is data encryption standard (DES)?

block cipher

stream cipher

bit cipher

byte cipher

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cryptanalysis is used __________

to find some insecurity in a cryptographic scheme

to increase the speed

to encrypt the data

to make new ciphers

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is a cryptographic protocol used to secure HTTP connection?

stream control transmission protocol (SCTP)

transport layer security (TLS)

explicit congestion notification (ECN)

resource reservation protocol

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?