220 CEH M20 Cryptography

220 CEH M20 Cryptography

University

5 Qs

quiz-placeholder

Similar activities

CH3 security

CH3 security

University

7 Qs

Quiz on Public Key Infrastructure (PKI)

Quiz on Public Key Infrastructure (PKI)

University

8 Qs

PART 7: NETWORK SECURITY

PART 7: NETWORK SECURITY

University

10 Qs

UNTIRTA I/O QUIZ WEEK 3

UNTIRTA I/O QUIZ WEEK 3

University

10 Qs

Викторина по сетевой безопасности

Викторина по сетевой безопасности

University

8 Qs

QUIZ-group5

QUIZ-group5

University

10 Qs

YBAA

YBAA

University

10 Qs

IT Quiz Bee 2025 - DIFFICULT

IT Quiz Bee 2025 - DIFFICULT

University

10 Qs

220 CEH M20 Cryptography

220 CEH M20 Cryptography

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Olivier Ligot

Used 2+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following algorithms is an example of symmetric encryption?

RSA

AES

ECC

DSA

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of hashing in cryptography?

Encrypt data for confidentiality

Generate encryption keys

Ensure data integrity

Authenticate users

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In blockchain technology, which cryptographic method is primarily used to ensure the immutability of data blocks?

Symmetric encryption

Hashing

Asymmetric encryption

Digital signatures

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of asymmetric encryption?

It uses a single key for both encryption and decryption

It is faster than symmetric encryption

It uses a public and a private key

It does not require key exchange

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does blockchain achieve trust and transparency in a distributed system?

By using centralized control

By encrypting all transactions

By using consensus mechanisms and cryptographic hashes

By avoiding cryptographic algorithms