Understanding Encryption and Hashing

Understanding Encryption and Hashing

University

10 Qs

quiz-placeholder

Similar activities

Ch 5: Cryptography Quiz 1

Ch 5: Cryptography Quiz 1

University

10 Qs

Message Authentication Code

Message Authentication Code

University

13 Qs

Authentication Quiz

Authentication Quiz

11th Grade - University

15 Qs

Blockchain quiz

Blockchain quiz

University

15 Qs

Quiz No. 3 II-CINS PNetSec (final term)

Quiz No. 3 II-CINS PNetSec (final term)

University

15 Qs

Cryptography Chap-1

Cryptography Chap-1

9th Grade - Professional Development

15 Qs

Git Quiz

Git Quiz

University

13 Qs

CNS QUIZ

CNS QUIZ

University

14 Qs

Understanding Encryption and Hashing

Understanding Encryption and Hashing

Assessment

Quiz

Computers

University

Hard

Created by

Santhiya M

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of message encryption?

To protect the confidentiality of information.

To reduce the size of the message data.

To ensure messages are easily readable by anyone.

To enhance the speed of message delivery.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Define a Message Authentication Code (MAC).

A Message Authentication Code (MAC) is a cryptographic checksum on data that provides integrity and authenticity.

A Message Authentication Code (MAC) is a type of encryption key.

A Message Authentication Code (MAC) is a digital signature for emails.

A Message Authentication Code (MAC) is a method for compressing data.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a hash function differ from encryption?

Both hash functions and encryption are two-way processes for securing data.

A hash function is one-way and used for integrity, while encryption is two-way and used for confidentiality.

Encryption is used for data integrity, while hash functions are used for data confidentiality.

A hash function can be reversed to retrieve the original data, while encryption cannot.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the common algorithms used for hashing?

HMAC

AES

MD5, SHA-1, SHA-256, SHA-512, bcrypt

RSA

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain the role of keys in message encryption.

Keys are primarily for data storage management.

Keys are irrelevant in message encryption.

Keys are essential for encrypting and decrypting messages, ensuring confidentiality and security.

Keys are only used for digital signatures.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the significance of a salt in hashing?

A salt enhances security by preventing hash collisions and defending against precomputed attacks.

A salt is a type of encryption key.

A salt is used to increase the speed of hashing.

A salt is only necessary for large datasets.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Describe a scenario where MAC is essential.

A military environment where sensitive information must be protected from unauthorized access.

A corporate office where employees share files openly.

A public library with unrestricted internet access.

A school playground where children play freely.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?