Tuesday, August 23, 2016

Cyber Security: Cryptography - Quiz

Question 1

What is ciphertext?
  • Information in human- or machine-readable form
  • Information that has been encrypted
  • A mathematical process for encrypting information
  • A mathematical process for decrypting information

Question 2

How many possible values can an encryption key that is 5 bits long have?

  • 5
  • 8
  • 10
  • 16
  • 32
  • 64
Testive Testive Testive

Question 3

Which of the following is a common feature of asymmetric cryptography?
  • Very short key lengths are used
  • Public keys can be given to anyone who wants to know, e.g. posted on a website
  • The key pair can be stored on a key chain server
  • Encryption and decryption are faster than symmetric cryptography

Question 4

Which one is the correct statement?

  • The SHA-2 hashing algorithm is flawed because two different data items can generate the same hash.
  • Collisions can occur in the MD-5 hashing algorithm under certain conditions.
  • Hashing can show whether data has changed in transmission and can confirm who the original author was.
  • Digital signatures are encrypted using the public key and decrypted using the private key.
  • Digital signatures are a good way of transmitting secrets.

Udemy Personaldevelopment300x250 Learn to make a mobile app! Question 5

How can you tell if your connection to a web page is secure? There are two possible answers.
  • A closed padlock symbol at the top of your browser window.
  • The web page will tell you that it is secure
  • The word SSL will appear at the top of your browser window
  • The address in your browser window will change from http:// to https://

1 comment: