
ITBP301_Chapter 02
Authored by Tarek Elsaka
Computers
University
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is the key characteristic of symmetric encryption?
It uses two keys, one public and one private
It only encrypts text data
It requires digital certificates
It uses the same key for encryption and decryption
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is a stream cipher feature?
Encrypts data in 64-bit blocks
Encrypts data bit-by-bit or byte-by-byte
Requires asymmetric keys
Always slower than block ciphers
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
One major drawback of DES is:
It uses a public key infrastructure
It uses a 64-bit key which is insecure
Its 56-bit key is vulnerable to brute-force attacks
It has poor performance in hardware
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is the output of a hash function commonly called?
Ciphertext
Plaintext
Digital signature
Hash value
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which application is not typically associated with hash functions?
Password verification
Digital signature verification
Real-time audio encryption
Message integrity checking
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What does MAC stand for?
Message Algorithm Code
Message Authentication Code
Multi Access Code
Manual Authentication Check
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Asymmetric encryption uses:
Only one key for all users
A pair of related keys – public and private
Multiple shared keys
A single private key for all operations
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?