Lesson 3

Lesson 3

University

30 Qs

quiz-placeholder

Similar activities

2024-25-2S-PROFEL4-PQ2

2024-25-2S-PROFEL4-PQ2

University

35 Qs

WS tools

WS tools

University

35 Qs

Câu hỏi về bảo mật thông tin

Câu hỏi về bảo mật thông tin

University

36 Qs

2024-25-1S-ICT106-BLISG3-SFQ11

2024-25-1S-ICT106-BLISG3-SFQ11

University

35 Qs

INFORMATION A

INFORMATION A

University

38 Qs

3d151 CDC Vol 2 Unit 2

3d151 CDC Vol 2 Unit 2

University - Professional Development

39 Qs

Four Corners 2, Unit 3 Quiz

Four Corners 2, Unit 3 Quiz

9th Grade - Professional Development

35 Qs

Wood Tool Quiz

Wood Tool Quiz

KG - University

34 Qs

Lesson 3

Lesson 3

Assessment

Quiz

Other

University

Hard

Created by

Benjamin Fenton

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the three fundamental categories of cryptographic functions?

Hashing algorithms, symmetric ciphers, and asymmetric ciphers

Digital certificates, digital signatures, and key escrow

Full-disk, volume, and file encryption

Transport Layer Security, IPsec, and WPA

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security property is provided only by symmetric encryption when two parties share the same secret key?

Authentication

Confidentiality

Non-repudiation

Perfect Forward Secrecy

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Advanced Encryption Standard (AES) with a 256-bit key has a keyspace of:

256 × 2 possible keys

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principal challenge of using symmetric cryptography between Alice and Bob over an untrusted network?

Secure key exchange

Excessive CPU overhead

Key length limitations

Inability to provide bulk encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement accurately describes a drawback of asymmetric encryption compared to symmetric encryption?

It is limited to 128-bit key lengths.

Its private key can be derived from the public key.

It cannot be used to distribute keys securely.

It requires substantially more processing power for bulk data.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A 256-bit ECC private key provides roughly the same security strength as which RSA key length?

3,072 bits

16,384 bits

1,024 bits

512 bits

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cryptographic function is specifically designed to be one-way and therefore supports integrity rather than confidentiality?

Elliptic Curve Diffie-Hellman

Hashing

Key escrow

Stream encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?