
General security Concepts Part 1
Authored by Cyber Geek
Information Technology (IT)
Professional Development
Used 7+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 20 pts
Which statement best describes symmetric encryption?
Uses the same key for encryption and decryption
Uses a public key to encrypt data and a private key to decrypt it
Encrypts data one bit at a time with no key
Automatically rotates keys for every message
Answer explanation
Symmetric encryption relies on a shared secret key for both encryption and decryption, making it fast and efficient for bulk data.
2.
MULTIPLE CHOICE QUESTION
20 sec • 20 pts
What is the main challenge of symmetric encryption?
Cipher complexity
High computational load
Compatibility with digital signatures
Key distribution
Answer explanation
The difficulty lies in securely sharing the secret key between sender and receiver without interception.
3.
MULTIPLE CHOICE QUESTION
20 sec • 20 pts
How does asymmetric encryption solve the key distribution problem?
By sharing the private key publicly
By using a shared secret for both parties
By using a public key to encrypt and a private key to decrypt
By encrypting only hashes, not the message
Answer explanation
Asymmetric encryption allows the public key to be shared freely, while the private key remains secret, solving key distribution challenges.
4.
MULTIPLE CHOICE QUESTION
20 sec • 20 pts
In hybrid encryption, what role does asymmetric encryption play?
Encrypts all bulk data
Creates digital signatures only
Exchanges a symmetric session key securely
Hashes the message before encryption
Answer explanation
Asymmetric encryption is used to securely transmit the symmetric session key, which then encrypts the actual data.
5.
MULTIPLE CHOICE QUESTION
20 sec • 20 pts
What is a key property of a secure hash function?
Encryption reversibility
Collision resistance
Use of a shared secret key
Ability to decrypt data
Answer explanation
A secure hash function is collision-resistant, meaning it is highly unlikely that two different inputs will produce the same hash value.
6.
MULTIPLE CHOICE QUESTION
20 sec • 20 pts
Why is salting used in password hashing?
To make passwords unreadable by adding a random string
To encrypt the password with a public key
To reduce hash computation time
To allow symmetric decryption
Answer explanation
Salting adds a unique random string to each password, making precomputed rainbow table attacks ineffective.
7.
MULTIPLE CHOICE QUESTION
20 sec • 20 pts
What does a digital signature ensure?
Only confidentiality of the message
Authentication, integrity, and non-repudiation
Faster encryption of bulk data
Public key distribution
Answer explanation
Digital signatures prove the sender’s identity, ensure the message wasn’t altered, and prevent the sender from denying it.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?