Search Header Logo

General security Concepts Part 1

Authored by Cyber Geek

Information Technology (IT)

Professional Development

Used 7+ times

General security Concepts Part 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 20 pts

Which statement best describes symmetric encryption?

Uses the same key for encryption and decryption

Uses a public key to encrypt data and a private key to decrypt it

Encrypts data one bit at a time with no key

Automatically rotates keys for every message

Answer explanation

Symmetric encryption relies on a shared secret key for both encryption and decryption, making it fast and efficient for bulk data.

2.

MULTIPLE CHOICE QUESTION

20 sec • 20 pts

What is the main challenge of symmetric encryption?

Cipher complexity

High computational load

Compatibility with digital signatures

Key distribution

Answer explanation

The difficulty lies in securely sharing the secret key between sender and receiver without interception.

3.

MULTIPLE CHOICE QUESTION

20 sec • 20 pts

How does asymmetric encryption solve the key distribution problem?

By sharing the private key publicly

By using a shared secret for both parties

By using a public key to encrypt and a private key to decrypt

By encrypting only hashes, not the message

Answer explanation

Asymmetric encryption allows the public key to be shared freely, while the private key remains secret, solving key distribution challenges.

4.

MULTIPLE CHOICE QUESTION

20 sec • 20 pts

In hybrid encryption, what role does asymmetric encryption play?

Encrypts all bulk data

Creates digital signatures only

Exchanges a symmetric session key securely

Hashes the message before encryption

Answer explanation

Asymmetric encryption is used to securely transmit the symmetric session key, which then encrypts the actual data.

5.

MULTIPLE CHOICE QUESTION

20 sec • 20 pts

What is a key property of a secure hash function?

Encryption reversibility

Collision resistance

Use of a shared secret key

Ability to decrypt data

Answer explanation

A secure hash function is collision-resistant, meaning it is highly unlikely that two different inputs will produce the same hash value.

6.

MULTIPLE CHOICE QUESTION

20 sec • 20 pts

Why is salting used in password hashing?

To make passwords unreadable by adding a random string

To encrypt the password with a public key

To reduce hash computation time

To allow symmetric decryption

Answer explanation

Salting adds a unique random string to each password, making precomputed rainbow table attacks ineffective.

7.

MULTIPLE CHOICE QUESTION

20 sec • 20 pts

What does a digital signature ensure?

Only confidentiality of the message

Authentication, integrity, and non-repudiation

Faster encryption of bulk data

Public key distribution

Answer explanation

Digital signatures prove the sender’s identity, ensure the message wasn’t altered, and prevent the sender from denying it.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?