Module 2 - 5th

Module 2 - 5th

University

8 Qs

quiz-placeholder

Similar activities

java quiz based on interface

java quiz based on interface

University

10 Qs

SQL JOINS

SQL JOINS

University

10 Qs

Quiz Modul 4 Ms Visio & Publisher

Quiz Modul 4 Ms Visio & Publisher

University

10 Qs

BB

BB

University

10 Qs

Networking Vocab

Networking Vocab

KG - University

10 Qs

Dr. S. Uma's Object Oriented Programming Quiz Event 1

Dr. S. Uma's Object Oriented Programming Quiz Event 1

University

10 Qs

CodeMonkey for B.Ed IT

CodeMonkey for B.Ed IT

University

10 Qs

CA Quiz 1

CA Quiz 1

University

10 Qs

Module 2 - 5th

Module 2 - 5th

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

poornima poojar

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

8 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Various modes for Block Ciphers are

ECB

CBC

OFB

CTR

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which mode of operation, each block of plaintext is XORed with the previously encrypted block

Cipher Block Chaining

Electronic Code Book

Counter Mode

Output Feedback

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Nonce is used to produce key stream in ............ mode.

Electronic Code Book

Cipher Block Chaining

Counter Mode

None of the abov

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

....... is used to verify whether the message has been modified by unauthorized entity

ECB

MAC

Hash

None of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Different keys are used for encryption and decryption in........... cryptography.

Symmetric

Asymmetric

Both Symmetric and Asymmetric

Hash functions

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____ key is used for encryption in Asymmetric

Public

Private

Public and Private

No key is used

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

..... key is freely available and published by the ........ key owner

Private, Public

Public, Public

Public, Private

Private, Public

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?