Hash Functions and Cryptography Quiz

Hash Functions and Cryptography Quiz

University

10 Qs

quiz-placeholder

Similar activities

SURVEILLANCE CONTROL SYSTEM

SURVEILLANCE CONTROL SYSTEM

University

15 Qs

CryptoQuiz

CryptoQuiz

University

15 Qs

Application Development and Emerging Technologies Quiz 5

Application Development and Emerging Technologies Quiz 5

University

13 Qs

Video Watermaking

Video Watermaking

University

11 Qs

HASHING IN DBMS

HASHING IN DBMS

University

15 Qs

FQuiz2 BSIT4C

FQuiz2 BSIT4C

University

15 Qs

Rail Fence Cipher

Rail Fence Cipher

12th Grade - University

15 Qs

Computer Security:Encryption

Computer Security:Encryption

10th Grade - University

10 Qs

Hash Functions and Cryptography Quiz

Hash Functions and Cryptography Quiz

Assessment

Quiz

Computers

University

Easy

Created by

ABISHA D undefined

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a property of a good hash function?

It is reversible

It produces variable length output

It is deterministic and produces fixed-length output

It produces the same output for different inputs

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which key is used to encrypt data in asymmetric encryption for confidentiality?

Secret key

Private key

Public key

Session key

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of digital signatures?

Encrypt data

Verify the authenticity of the sender

Compress data

Hide the message from the recipient

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a distributed system, what ensures that all nodes agree on a shared state?

Hashing

Consensus mechanism

Load balancer

Time synchronization

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a disadvantage of centralized systems compared to distributed systems?

Lower latency

Easier maintenance

Single point of failure

Faster access control

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary role of a node in a peer-to-peer network?

Acts only as a client

Acts as both client and server

Routes traffic

Encrypts all messages

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which data structure is most commonly used for verifying transaction integrity in blockchains?

Binary tree

B-tree

Merkle tree

AVL tree

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?