placeholder image to represent content

W10: CP05 Quiz (CSSD0223)

Quiz by Bryan N. Manalaotao

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
15 questions
Show answers
  • Q1
    What is the primary goal of cryptography?
    Data redundancy
    Data integrity
    Data breach
    Data replication
    30s
  • Q2
    Which discipline of cryptology involves developing and using codes for private communication?
    Cryptography
    Cryptanalysis
    Cryptobotany
    Cryptosynthesis
    30s
  • Q3
    Which type of cipher rearranges letters without replacing them?
    Substitution cipher
    Transposition cipher
    Block cipher
    Polyalphabetic cipher
    30s
  • Q4
    What method does a cryptanalyst use when having access to only the ciphertext of several messages?
    Chosen-plaintext
    Known-plaintext
    Brute-force
    Ciphertext
    30s
  • Q5
    What is the primary factor ensuring the security of encryption in modern technology?
    Length of the key
    Length of the plaintext
    Availability of the ciphertext
    Complexity of the algorithm
    30s
  • Q6
    What cryptographic function is used to verify and ensure data integrity?
    Decryption
    Encryption
    Hashing
    Encoding
    30s
  • Q7
    Which property must a cryptographic hash function possess?
    Ease of computation for any input
    Reversible
    Collision-free
    Variable output length
    30s
  • Q8
    Which hashing algorithm is similar to MD5 hash functions?
    MD5
    SHA-512
    SHA-1
    SHA-256
    30s
  • Q9
    What additional element does HMAC use to add authentication to data integrity?
    Private key
    Public key
    Secret key
    Hash value
    30s
  • Q10
    Which encryption algorithm uses the same key for both encryption and decryption?
    Asymmetric encryption
    Private-key encryption
    Public-key encryption
    Symmetric encryption
    30s
  • Q11
    What is the primary advantage of asymmetric encryption over symmetric encryption?
    Less resource-intensive
    Simpler key management
    Stronger security
    Faster processing speed
    30s
  • Q12
    Which asymmetric algorithm is commonly used for digital signatures?
    RSA
    DES
    SHA
    AES
    30s
  • Q13
    What technique allows two computers to generate a shared secret without having communicated before?
    RSA
    HMAC
    AES
    Diffie-Hellman
    30s
  • Q14
    What is the primary purpose of digital certificates in a PKI?
    Securing network traffic
    Generating hash values
    Verifying identity
    Encrypting data
    30s
  • Q15
    Which topology involves individual CAs establishing trust relationships with other CAs?
    Single-root PKI
    Hierarchical CA
    Symmetric CA
    Cross-certified CA
    30s

Teachers give this quiz to your class