Search Header Logo

Module 2 - 4th

Authored by poornima poojar

Computers

University

Used 1+ times

Module 2 - 4th
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Symmetric Cryptography is also called as

Shared Key Cruptogtography

Symmetric Key Cryptography

Secret Key Cryptography

None of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____ is a number that can be used only once in a cryptographic protocol.

Nonce

Sequence Number

Random Number

Fixed number

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Message Authentication Codes (MACs) are also called as _____

Keyless Hash Functions

Authentication Functions

Cryptographic Functions

Keyed Hash Functions

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In HMACs the sender signs a message using the MAC and the receiver verifies it using shared keys.

False

True

May be

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The applications of hash functions in Blockchain Technologies are.........

Merkle Trees

Patricia Trees

Distributed Hash Tables

All of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

.................. are encryption algorithms that apply encryption algorithm on a bit-by-bit basis.

Block ciphers

Stream Ciphers

HMACs

None of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Stream Ciphers are

  1. i. Synchronous

  2. ii. Asynchronous

  3. iii. Random

i only

ii only

i,ii,iii

i and ii only

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?