What is ciphertext?
- Information in human- or machine-readable form
- Information that has been encrypted
- A mathematical process for encrypting information
- A mathematical process for decrypting information
Question 2
How many possible values can an encryption key that is 5 bits long have?
- 5
- 8
- 10
- 16
- 32
- 64
Question 3
Which of the following is a common feature of asymmetric cryptography?
- Very short key lengths are used
- Public keys can be given to anyone who wants to know, e.g. posted on a website
- The key pair can be stored on a key chain server
- Encryption and decryption are faster than symmetric cryptography
Question 4
Which one is the correct statement?
- The SHA-2 hashing algorithm is flawed because two different data items can generate the same hash.
- Collisions can occur in the MD-5 hashing algorithm under certain conditions.
- Hashing can show whether data has changed in transmission and can confirm who the original author was.
- Digital signatures are encrypted using the public key and decrypted using the private key.
- Digital signatures are a good way of transmitting secrets.
How can you tell if your connection to a web page is secure? There are two possible answers.
- A closed padlock symbol at the top of your browser window.
- The web page will tell you that it is secure
- The word SSL will appear at the top of your browser window
- The address in your browser window will change from http:// to https://
Where can we find the answers?
ReplyDeleteGreat quiz on cyber security basics! For anyone serious about protecting digital assets and fighting cyber threats, the B.Sc. (Hons.) Cyber Security programme offers in-depth knowledge and hands-on skills.
ReplyDelete