Module 2- 3rd Topic

Module 2- 3rd Topic

University

7 Qs

quiz-placeholder

Similar activities

DBMS - Hash Indexing

DBMS - Hash Indexing

University

10 Qs

Java_Collection_I

Java_Collection_I

University

10 Qs

Hashing

Hashing

University

10 Qs

DSA Quiz 4 Set 1

DSA Quiz 4 Set 1

University

10 Qs

Blockchain Quiz

Blockchain Quiz

University

10 Qs

Pelatihan Praktik Ethical Hacking #1 - OWASP Top 10 2021

Pelatihan Praktik Ethical Hacking #1 - OWASP Top 10 2021

University

7 Qs

Chapter 5 Quiz

Chapter 5 Quiz

University

10 Qs

QuizChapter2

QuizChapter2

University

11 Qs

Module 2- 3rd Topic

Module 2- 3rd Topic

Assessment

Quiz

Computers

University

Medium

Created by

poornima poojar

Used 2+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cryptography is the science of making information ____ in the presence of adversaries.

Compress

flexible

Secure

Trustable

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of converting Plaintext to Cipher text is called ___________

Decryption

Cryptography

Hash

Encryption

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Following are security properties of Hash Functions.

Pre-image Resistance

Second Pre-image Resistance

Third Pre-image Resistance

Collision Resistance

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

MD5 is a __ bit hash function that is commonly used for file integrity checks.

128

256

512

1024

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

SHA -0 is introduced by the _____

NSA (National Security Agency)

NIST (National Institute of Standards and Technology)

ISO (International Organization for Standardization)

IEEE (Institute of Electrical and Electronics Engineers)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

RIPEMD is the acronym for

Reduced Instruction Processor for Encryption and Message Digests

Reliable Information Processing for Efficient Message Digests

Race Integrity Primitives Evaluation Message Digest

Robust International Protocol for Enhanced Message Digests

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

SHA-256 algorithm works in ___ steps

8

9

10

11