
W10: CP05 Quiz (CSSD0223)
Quiz by Bryan N. Manalaotao
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
15 questions
Show answers
- Q1What is the primary goal of cryptography?Data redundancyData integrityData breachData replication30s
- Q2Which discipline of cryptology involves developing and using codes for private communication?CryptographyCryptanalysisCryptobotanyCryptosynthesis30s
- Q3Which type of cipher rearranges letters without replacing them?Substitution cipherTransposition cipherBlock cipherPolyalphabetic cipher30s
- Q4What method does a cryptanalyst use when having access to only the ciphertext of several messages?Chosen-plaintextKnown-plaintextBrute-forceCiphertext30s
- Q5What is the primary factor ensuring the security of encryption in modern technology?Length of the keyLength of the plaintextAvailability of the ciphertextComplexity of the algorithm30s
- Q6What cryptographic function is used to verify and ensure data integrity?DecryptionEncryptionHashingEncoding30s
- Q7Which property must a cryptographic hash function possess?Ease of computation for any inputReversibleCollision-freeVariable output length30s
- Q8Which hashing algorithm is similar to MD5 hash functions?MD5SHA-512SHA-1SHA-25630s
- Q9What additional element does HMAC use to add authentication to data integrity?Private keyPublic keySecret keyHash value30s
- Q10Which encryption algorithm uses the same key for both encryption and decryption?Asymmetric encryptionPrivate-key encryptionPublic-key encryptionSymmetric encryption30s
- Q11What is the primary advantage of asymmetric encryption over symmetric encryption?Less resource-intensiveSimpler key managementStronger securityFaster processing speed30s
- Q12Which asymmetric algorithm is commonly used for digital signatures?RSADESSHAAES30s
- Q13What technique allows two computers to generate a shared secret without having communicated before?RSAHMACAESDiffie-Hellman30s
- Q14What is the primary purpose of digital certificates in a PKI?Securing network trafficGenerating hash valuesVerifying identityEncrypting data30s
- Q15Which topology involves individual CAs establishing trust relationships with other CAs?Single-root PKIHierarchical CASymmetric CACross-certified CA30s