Cryptography Part 2

Cryptography Part 2

University

25 Qs

quiz-placeholder

Similar activities

Uji Pemahaman Rekam Jejak Digital

Uji Pemahaman Rekam Jejak Digital

7th Grade - University

20 Qs

Network + Domain 4: IT Security Concepts Quiz

Network + Domain 4: IT Security Concepts Quiz

University

25 Qs

Digitalization and Development

Digitalization and Development

University

20 Qs

Cybersecurity Knowlege assessment

Cybersecurity Knowlege assessment

University

24 Qs

IT ELECTIVES - ROBOTICS 1ST QUIZ

IT ELECTIVES - ROBOTICS 1ST QUIZ

University

20 Qs

Q5. Ethical Issues in information technology

Q5. Ethical Issues in information technology

University

20 Qs

PTS Genap Informatika Kelas XII

PTS Genap Informatika Kelas XII

12th Grade - University

20 Qs

Security Fundamental

Security Fundamental

University

20 Qs

Cryptography Part 2

Cryptography Part 2

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

ramil bautista

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is NOT a key property of a hash function?

Pre-Image Resistance

Second Pre-Image Resistance

Deterministic Collision Generation

Collision Resistance

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the output size of the SHA-256 hash function?

128-bit

160-bit

256-bit

512-bit

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which step in the digital signature process involves encrypting the hash with the private key?

Hash creation

Encryption of the hash

Decryption of the signature

Comparison of hashes

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which cryptographic application is used to validate document authenticity and integrity?

Hashing

Symmetric Encryption

Data Integrity Check

Digital Signatures

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Why is MD5 now considered insecure?

Large output size

Second Pre-Image resistance failure

Slow computation

Vulnerabilities

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which cryptographic technique allows computations on encrypted data?

Homomorphic Encryption

Quantum Cryptography

Blockchain Technology

File System Encryption

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which type of encryption encrypts files and folders on storage devices?

Backup Encryption

Cloud Storage Encryption

File System Encryption

Database Encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?