
Cryptography
Authored by herny husny
Other
University
Used 7+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which key is used for only one session?
Master Key
Data Key
Session Key
Public Key
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
How is a master key usually protected?
Encrypted with AES
Stored in a cloud server
Secure hardware and access control
Shared with all users
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What problem arises when every pair of devices needs a key?
Key management becomes complex
Data gets lost
Too many certificates
Nothing happens
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Why can’t a master key be encrypted like other keys?
It is too large
Would require another key, creating a loop
It is not used often
It is always public
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which technique helps manage keys in a large system?
Hashing
Firewall
Hierarchical Key Control
Compression
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What does AES stand for?
Advanced Encryption Standard
Authenticated Exchange System
Automated Encryption Service
Advanced Entry Security
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which key protects other keys?
Public Key
Session Key
Data Key
Master Key
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?