
17.1 Encryption & Protocols and Digital Certs. Cambridge iA 9618
Authored by Stephen Ling-Winston
Computers
12th Grade
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of encryption?
To convert plaintext into ciphertext for security
To convert binary code into text
To execute secure programs
To compress files for faster transfer
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes symmetric key encryption?
The same key is used for both encryption and decryption
A public key encrypts and a private key decrypts
Different keys are used for encryption and decryption
No key is required for decryption
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which encryption method uses two keys: one for encryption and one for decryption?
Asymmetric encryption
Symmetric encryption
Hashing
Digital certificates
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a key advantage of asymmetric encryption?
It allows secure communication without sharing a secret key
It encrypts data faster than symmetric encryption
It does not require a public key
It does not require decryption
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In asymmetric encryption, what does a sender use to encrypt a private message to a recipient?
The recipient’s public key
The sender’s private key
The recipient’s private key
A symmetric key
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main disadvantage of symmetric key encryption?
The key must be securely shared between sender and recipient
It requires a long key length to be effective
It cannot encrypt large amounts of data
It does not work with digital certificates
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following statements about a public key is true?
It is shared openly and used for encryption
It must be kept secret and used for decryption
It is only used in symmetric encryption
It is used to decrypt messages
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?