Module 2 - 4th

Module 2 - 4th

University

8 Qs

quiz-placeholder

Similar activities

Securing Windows

Securing Windows

9th Grade - University

10 Qs

Ujian Taklim

Ujian Taklim

University

10 Qs

I8CSE383T

I8CSE383T

University

10 Qs

Unit 10 Cybersecurity CSP

Unit 10 Cybersecurity CSP

12th Grade - University

13 Qs

FIT1047 week 11

FIT1047 week 11

University

13 Qs

Digital Signeture

Digital Signeture

University

13 Qs

ITBP301_Chapter 03-04

ITBP301_Chapter 03-04

University

10 Qs

Seatwork HASH (Data Structure)

Seatwork HASH (Data Structure)

University

10 Qs

Module 2 - 4th

Module 2 - 4th

Assessment

Quiz

Computers

University

Medium

Created by

poornima poojar

Used 1+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Symmetric Cryptography is also called as

Shared Key Cruptogtography

Symmetric Key Cryptography

Secret Key Cryptography

None of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____ is a number that can be used only once in a cryptographic protocol.

Nonce

Sequence Number

Random Number

Fixed number

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Message Authentication Codes (MACs) are also called as _____

Keyless Hash Functions

Authentication Functions

Cryptographic Functions

Keyed Hash Functions

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In HMACs the sender signs a message using the MAC and the receiver verifies it using shared keys.

False

True

May be

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The applications of hash functions in Blockchain Technologies are.........

Merkle Trees

Patricia Trees

Distributed Hash Tables

All of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

.................. are encryption algorithms that apply encryption algorithm on a bit-by-bit basis.

Block ciphers

Stream Ciphers

HMACs

None of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Stream Ciphers are

  1. i. Synchronous

  2. ii. Asynchronous

  3. iii. Random

i only

ii only

i,ii,iii

i and ii only

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Block ciphers are built using a design strategy known as .............

Stream Cipher Design

Feistel Cipher

Asymmetric Encryption

Hash Function