Module 2- 3rd Topic

Module 2- 3rd Topic

University

7 Qs

quiz-placeholder

Similar activities

Computación distribuida y paralela

Computación distribuida y paralela

University

10 Qs

QuizChapter2

QuizChapter2

University

11 Qs

EC335 - Quiz 1

EC335 - Quiz 1

University

10 Qs

Computer Science Password Hashing

Computer Science Password Hashing

University

10 Qs

ITBP301_Chapter 02

ITBP301_Chapter 02

University

10 Qs

English Computer

English Computer

University

11 Qs

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

University

10 Qs

iGCSE Cryptography (2023 onwards)

iGCSE Cryptography (2023 onwards)

9th Grade - University

10 Qs

Module 2- 3rd Topic

Module 2- 3rd Topic

Assessment

Quiz

Computers

University

Medium

Created by

poornima poojar

Used 2+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cryptography is the science of making information ____ in the presence of adversaries.

Compress

flexible

Secure

Trustable

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of converting Plaintext to Cipher text is called ___________

Decryption

Cryptography

Hash

Encryption

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Following are security properties of Hash Functions.

Pre-image Resistance

Second Pre-image Resistance

Third Pre-image Resistance

Collision Resistance

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

MD5 is a __ bit hash function that is commonly used for file integrity checks.

128

256

512

1024

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

SHA -0 is introduced by the _____

NSA (National Security Agency)

NIST (National Institute of Standards and Technology)

ISO (International Organization for Standardization)

IEEE (Institute of Electrical and Electronics Engineers)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

RIPEMD is the acronym for

Reduced Instruction Processor for Encryption and Message Digests

Reliable Information Processing for Efficient Message Digests

Race Integrity Primitives Evaluation Message Digest

Robust International Protocol for Enhanced Message Digests

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

SHA-256 algorithm works in ___ steps

8

9

10

11