Search Header Logo

Understanding Cryptography Fundamentals

Authored by Darshankumar Chauhan

Computers

Professional Development

Understanding Cryptography Fundamentals
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a symmetric encryption algorithm?

RSA

AES

DSA

ECC

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between symmetric and asymmetric encryption?

Symmetric uses two keys, asymmetric uses one key

Symmetric uses one key, asymmetric uses two keys

Both use the same number of keys

Symmetric is slower than asymmetric

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cryptographic technique is primarily used to ensure data integrity?

Hash functions

Symmetric encryption

Asymmetric encryption

Steganography

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a property of a good cryptographic hash function?

Deterministic output

Easy to reverse

Collision resistance

Fast computation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which algorithm is commonly used for digital signatures?

DES

DSA

RC4

Blowfish

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of a digital signature?

Encrypt data

Verify authenticity and integrity

Compress data

Generate random numbers

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key management technique?

Key escrow

Key painting

Key hashing

Key padding

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?