Search Header Logo

17.1 Encryption & Protocols and Digital Certs. Cambridge iA 9618

Authored by Stephen Ling-Winston

Computers

12th Grade

Used 5+ times

17.1 Encryption & Protocols and Digital Certs. Cambridge iA 9618
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of encryption?

To convert plaintext into ciphertext for security

To convert binary code into text

To execute secure programs

To compress files for faster transfer

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes symmetric key encryption?

The same key is used for both encryption and decryption

A public key encrypts and a private key decrypts

Different keys are used for encryption and decryption

No key is required for decryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption method uses two keys: one for encryption and one for decryption?

Asymmetric encryption

Symmetric encryption

Hashing

Digital certificates

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key advantage of asymmetric encryption?

It allows secure communication without sharing a secret key

It encrypts data faster than symmetric encryption

It does not require a public key

It does not require decryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In asymmetric encryption, what does a sender use to encrypt a private message to a recipient?

The recipient’s public key

The sender’s private key

The recipient’s private key

A symmetric key

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main disadvantage of symmetric key encryption?

The key must be securely shared between sender and recipient

It requires a long key length to be effective

It cannot encrypt large amounts of data

It does not work with digital certificates

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements about a public key is true?

It is shared openly and used for encryption

It must be kept secret and used for decryption

It is only used in symmetric encryption

It is used to decrypt messages

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?