placeholder image to represent content

Network Security (Basics)

Quiz by Yauhen Arnatovich

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
11 questions
Show answers
  • Q1

    What a cryptographic hash function can provide?

    Authenticity

    Integrity

    Privacy

    Availability

    30s
  • Q2

    To generate a digital signature, which entity will you use?

    Public key

    Key-based hashing

    Certificate

    Private key

    30s
  • Q3

    Public-key cryptography solves the problem of ___ ?

    Key derivation

    Key reservation

    Key validation

    Key distribution

    30s
  • Q4

    Communication using TLS begins with ___ ?

    Ping

    Proposal

    Handshake

    Vote

    30s
  • Q5

    To provide confidentiality for a large amount of data, what cryptography will you use?

    Symmetric 

    Hash

    Asymmetric 

    Any of them

    30s
  • Q6

    Which of the following can be a root CA?

    GlobalSign

    DigiCert

    Entrust

    All of them

    30s
  • Q7

    In public-key cryptography, data can be encrypted/decrypted with ___  keys?

    Private only

    Public only

    Symmetric

    Private or public

    30s
  • Q8

    In public-key cryptography, a message shall be signed with ___ keys?

    Hash

    Public only

    Private only

    Private or public

    30s
  • Q9

    What is the minimum key size recommended to use today for data protection?

    1024

    2048

    512

    3072

    30s
  • Q10

    TLS can be used by ___ ?

    Emails and messages

    Web applications and servers

    All of them

    VoIP

    30s
  • Q11

    The TLS protocol provides ___ ?

    Manageability

    Confidentiality

    Reliability

    Availability

    30s

Teachers give this quiz to your class