Search Header Logo

Lesson 3

Authored by Benjamin Fenton

Other

University

Used 2+ times

Lesson 3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the three fundamental categories of cryptographic functions?

Hashing algorithms, symmetric ciphers, and asymmetric ciphers

Digital certificates, digital signatures, and key escrow

Full-disk, volume, and file encryption

Transport Layer Security, IPsec, and WPA

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security property is provided only by symmetric encryption when two parties share the same secret key?

Authentication

Confidentiality

Non-repudiation

Perfect Forward Secrecy

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Advanced Encryption Standard (AES) with a 256-bit key has a keyspace of:

256 × 2 possible keys

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principal challenge of using symmetric cryptography between Alice and Bob over an untrusted network?

Secure key exchange

Excessive CPU overhead

Key length limitations

Inability to provide bulk encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement accurately describes a drawback of asymmetric encryption compared to symmetric encryption?

It is limited to 128-bit key lengths.

Its private key can be derived from the public key.

It cannot be used to distribute keys securely.

It requires substantially more processing power for bulk data.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A 256-bit ECC private key provides roughly the same security strength as which RSA key length?

3,072 bits

16,384 bits

1,024 bits

512 bits

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cryptographic function is specifically designed to be one-way and therefore supports integrity rather than confidentiality?

Elliptic Curve Diffie-Hellman

Hashing

Key escrow

Stream encryption

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?