Cryptography and Security Quiz

Cryptography and Security Quiz

University

20 Qs

quiz-placeholder

Similar activities

Cybersecurity Essentials

Cybersecurity Essentials

University

20 Qs

Cryptology and Modern Network Security Quiz

Cryptology and Modern Network Security Quiz

University

24 Qs

Exploring Cryptography Concepts

Exploring Cryptography Concepts

University

20 Qs

RIDDLE_IT_OUT

RIDDLE_IT_OUT

University

20 Qs

Decode the Tech Emoji

Decode the Tech Emoji

University

20 Qs

Quiz 02-Finals-IT 222-FIAS

Quiz 02-Finals-IT 222-FIAS

University

18 Qs

Usable Encryption Quiz

Usable Encryption Quiz

University

20 Qs

AISB223 Chapter 12: Confidentiality and Privacy Controls

AISB223 Chapter 12: Confidentiality and Privacy Controls

University

20 Qs

Cryptography and Security Quiz

Cryptography and Security Quiz

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Edward Adu

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the primary difference between symmetric and asymmetric encryption?

Symmetric uses two keys; asymmetric uses one key

Symmetric uses one key for encryption and decryption; asymmetric uses a public and private key pair

Symmetric is slower than asymmetric

Asymmetric encryption cannot be used for secure communications

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is a common symmetric encryption algorithm?

RSA

AES

ECC

Diffie-Hellman

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What does asymmetric encryption solve that symmetric encryption struggles with?

The need for faster encryption

Secure distribution of encryption keys

Data integrity

Larger data volume encryption

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

In asymmetric encryption, what is the purpose of the public key?

To decrypt data

To sign messages

To encrypt data and verify digital signatures

To be kept secret

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What role does hashing serve in cryptography?

It encrypts the message

It provides a fixed-size digest that represents the original data, ensuring data integrity

It generates encryption keys

It decrypts data

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which hashing algorithm is considered obsolete due to vulnerabilities?

SHA-256

MD5

SHA-3

SHA-1

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

How is a digital signature created?

Encrypting the entire message with the sender's public key

Applying a hash function to the message and encrypting the hash with the sender's private key

Encrypting the hash with a symmetric key

Generating a random number for each message

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Information Technology (IT)