Skip to content
3D-LABS
We Are Engineers, Researchers, Designers, Developers and Consultants
Home
Services
Career
Contact
Investors
Home
Services
Career
Contact
Investors
Cyrptography and Encryption Quiz
Quiz o Clock
Which of the following algorithms is an example of symmetric key cryptography?
A. RSA
B. DSA
C.AES
D. ECC
What does RSA stand for in RSA encryption?
A. Rivest, Shamir, Adleman
B. Random, Secure, Algorithm
C. Reliable, Secure, Advanced
D. Rivest, Secure, Algorithm
In public key cryptography, the public key is used for:
A. Decryption
B.Encryption
C.Both encryption and decryption
D. Generating keys
Which cryptographic principle ensures that a message cannot be altered without detection?
A. Confidentiality
B. Integrity
C.Authentication
D. Non-repudiation
Which of the following is NOT a feature of a cryptographic hash function?
A. Pre-image resistance
B.Collision resistance
C. Key-dependent output
D. Deterministic output
Which encryption standard was chosen by NIST in 2001 to replace DES?
A.Blowfish
B.Twofish
C.AES
D. AES
What is the main purpose of a digital signature in cryptography?
A. To encrypt messages
B. To verify the authenticity and integrity of a message
C.To decrypt messages
D. To generate a secret key
Which type of cryptographic attack involves trying every possible key until the correct one is found?
A. Man-in-the-middle attack
B. Replay attack
C. Phishing attack
D. Brute force attack
What does the term "cryptographic key length" refer to?
A.The physical size of the key
B. The number of characters in the key
C.The number of bits in the key
D. The strength of the encryption algorithm
Which of the following cryptographic techniques can be used to ensure confidentiality?
A. Hash functions
B.Symmetric encryption
C. Digital signatures
D.Public key infrastructure (PKI)
Score card
Take Retest
Done
Close