placeholder image to represent content

Network Security (Basics)

Quiz by Yauhen Arnatovich

Feel free to use or edit a copy

includes Teacher and Student dashboards

Measure skills
from any curriculum

Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.

With a free account, teachers can
  • edit the questions
  • save a copy for later
  • start a class game
  • view complete results in the Gradebook and Mastery Dashboards
  • automatically assign follow-up activities based on students’ scores
  • assign as homework
  • share a link with colleagues
  • print as a bubble sheet

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
11 questions
Show answers
  • Q1

    What a cryptographic hash function can provide?

    Authenticity

    Integrity

    Privacy

    Availability

    30s
  • Q2

    To generate a digital signature, which entity will you use?

    Public key

    Key-based hashing

    Certificate

    Private key

    30s
  • Q3

    Public-key cryptography solves the problem of ___ ?

    Key derivation

    Key reservation

    Key validation

    Key distribution

    30s
  • Q4

    Communication using TLS begins with ___ ?

    Ping

    Proposal

    Handshake

    Vote

    30s
  • Q5

    To provide confidentiality for a large amount of data, what cryptography will you use?

    Symmetric 

    Hash

    Asymmetric 

    Any of them

    30s
  • Q6

    Which of the following can be a root CA?

    GlobalSign

    DigiCert

    Entrust

    All of them

    30s
  • Q7

    In public-key cryptography, data can be encrypted/decrypted with ___  keys?

    Private only

    Public only

    Symmetric

    Private or public

    30s
  • Q8

    In public-key cryptography, a message shall be signed with ___ keys?

    Hash

    Public only

    Private only

    Private or public

    30s
  • Q9

    What is the minimum key size recommended to use today for data protection?

    1024

    2048

    512

    3072

    30s
  • Q10

    TLS can be used by ___ ?

    Emails and messages

    Web applications and servers

    All of them

    VoIP

    30s
  • Q11

    The TLS protocol provides ___ ?

    Manageability

    Confidentiality

    Reliability

    Availability

    30s

Teachers give this quiz to your class