Search Header Logo

Cryptography Part 2

Authored by ramil bautista

Information Technology (IT)

University

Cryptography Part 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is NOT a key property of a hash function?

Pre-Image Resistance

Second Pre-Image Resistance

Deterministic Collision Generation

Collision Resistance

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the output size of the SHA-256 hash function?

128-bit

160-bit

256-bit

512-bit

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which step in the digital signature process involves encrypting the hash with the private key?

Hash creation

Encryption of the hash

Decryption of the signature

Comparison of hashes

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which cryptographic application is used to validate document authenticity and integrity?

Hashing

Symmetric Encryption

Data Integrity Check

Digital Signatures

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Why is MD5 now considered insecure?

Large output size

Second Pre-Image resistance failure

Slow computation

Vulnerabilities

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which cryptographic technique allows computations on encrypted data?

Homomorphic Encryption

Quantum Cryptography

Blockchain Technology

File System Encryption

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which type of encryption encrypts files and folders on storage devices?

Backup Encryption

Cloud Storage Encryption

File System Encryption

Database Encryption

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?