SlideShare a Scribd company logo
1
1.Digital signatures provide: (Select 3 answers)
A. Integrity
B. Authentication
C. Confidentiality
D. Authorization
E. Non-repudiation
F. Accounting
2.In cryptography, the number of bits in a key used by a cryptographic algorithm is
referred to as a key size or key length. The key length determines the maximum number
of combinations required to break the encryption algorithm, therefore typically a longer
key means stronger cryptographic security.
A. True
B. False
3. Which of the following answers refers to a type of additional input that increases
password complexity and provides better protection against brute-force, dictionary, and
rainbow table attacks?
A. Seed
B. IV
C. Salt
D. Shim
4. An emerging field of advanced computing technologies based on the principles of
physics is known as:
A. DNA computing
B. Edge computing
C. Quantum computing
D. Fog computing
5. According to predictions, the most future-proof cryptographic solution should be:
A. Quantum cryptography
B. Symmetric-key cryptography
C. Post-quantum cryptography
D. Asymmetric-key cryptography
E. Public-key cryptography
6. One of the main points of vulnerability of a system is that data in _____ is not encrypted.
Cryptography Quiz
July 4, 2025
2
A. use
B. devices
C. storage
D. transmission
7. Cryptography is used to conceal data in transmission by the use of _____.
A. encryption
B. checksum
C. decryption
D. authentication
8. The term "Blockchain" refers to a decentralized digital ledger system (i.e. a specific type
of a distributed database) stored across multiple computers in a P2P network.
A. True
B. False
9. Which of the following block cipher modes is the simplest/weakest and therefore not
recommended for use?
A. CBC
B. GCM
C. ECB
D. CTR
10. A type of encryption scheme where the same key is used to encrypt and decrypt data is
referred to as: (Select 3 answers)
A. Session-key encryption
B. Public-key encryption
C. Symmetric encryption
D. Asymmetric encryption
E. Secret-key encryption
Cryptography Quiz
July 4, 2025
3
11. In asymmetric encryption, any message encrypted with the use of a public key can only
be decrypted by applying the same algorithm and a matching private key (and vice versa).
A. True
B. False
12. Which of the algorithms listed below does not belong to the category of symmetric
ciphers?
A. RC4
B. DES
C. RSA
D. AES
E. Blowfish
F. 3DES
G. Twofish
13. Which of the algorithms listed below does not fall into the category of asymmetric
encryption?
A. RSA
B. GPG
C. DSA
D. AES
E. DHE
F. ECDHE
G. PGP
14. What is the purpose of steganography?
A. Checking data integrity
B. Verifying hash values
C. Hiding data within another piece of data
D. Encrypting data
15. Which of the following terms applies to the authentication process?
A. Digital certificate
B. MFA
Cryptography Quiz
July 4, 2025
4
C. Encryption
D. Security through obscurity
E. Hashing
16. It takes a data in a group of same size generally to encrypt plaintext text data
A. Stream Cipher
B. Block Cipher
C. AES
D. RSA
17. Which encryption you would prefer when you need to encrypt a large amount of data
A. Symmetric
B. Asymmetric
C. Elliptic Curve
D. Stream
18. To use digital signatures, you would need the _____ key to digitally sign data, and
the _____ key to verify the signature.
A. hashed, decrypted
B. private, public
C. encrypted, decrypted
D. public, private
19. A digital signature provides
A. Non-repudiation
B. Symmetric Encryption
C. Authenticity Protection
D. Integrity Protection
20. Cryptography protects data
A. From being downloaded
B. From Remote Code Execution
C. In transit and at rest
D. From DoS attack
21. Which of the following is true about Public Key Infrastructure?
Cryptography Quiz
July 4, 2025
5
A. PKI is a combination of digital certificates, public-key cryptography, and certificate
authorities that provide enterprise-wide security.
B. PKI uses two-way symmetric key encryption with digital certificates, and Certificate
Authority.
C. PKI uses private and public keys but does not use digital certificates.
D. PKI uses CHAP authentication.
22. Which has a key length of 128 bits?
a) IDEA
b) Triple-DES
c) IDEA & Triple-DES
d) None of the mentioned
23. Examples of hash functions are
a) MD5
b) SHA-1
c) MD5 & SHA-1
d) None of the mentioned
24.Your manager wants you to review the company’s internal PKI system’s CPS for
applicability and verification and to ensure that it meets current needs. What are you most
likely to focus on?
A. Revocations
B. Trust level provided to users
C. Key entropy
D. How the keys are stored
25. Cryptographic hash function takes an arbitrary block of data and returns _________
a) fixed size bit string
b) variable size bit string
c) both fixed size bit string and variable size bit string
d) variable sized byte string
Cryptography Quiz
July 4, 2025

More Related Content

Similar to Cryptography Quiz: test your knowledge of this important security concept. (20)

DOCX
Unit I Q&A.docx
karthikaparthasarath
 
PDF
2) In MD-5 algorithm A- using 4 rounds of 16-bit operations on message.pdf
ketandabbe
 
PPTX
4_5769479639445540375.pptx
HHoko1
 
PDF
020-100 Certification Exam Unlock Success Dumps pdf.pdf
Aliza Oscar
 
PDF
312 50-demo
Tomas Vileikis
 
PDF
Cryptograpy Exam
Lisa Olive
 
DOCX
Multi-Biometric Authentication through Hybrid Cryptographic System
MangaiK4
 
PDF
Cissp cbk final_exam-answers_v5.5
madunix
 
PDF
Information Security and IT Risk Management 1st Edition Agrawal Test Bank
bwkjrdia178
 
PDF
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
IOSR Journals
 
PDF
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
IOSR Journals
 
PDF
E017212836
IOSR Journals
 
PDF
Sy0 401-q&a-demo-cert magic
jenie Emmons
 
PDF
Download full ebook of n instant download pdf
elougabakst
 
DOCX
1) Which of the following are Penetration testing methodology .docx
SONU61709
 
PDF
kasodhan2019.pdf
40NehaPagariya
 
PDF
Cryptography and Network Security Principles and Practice 6th Edition William...
jiuweimurth12
 
PDF
Information Security and IT Risk Management 1st Edition Agrawal Test Bank
eiltsjchassz5
 
PPTX
Network Security(MD5)
United International University
 
PDF
Com Ed 8 Finals
bluejayjunior
 
Unit I Q&A.docx
karthikaparthasarath
 
2) In MD-5 algorithm A- using 4 rounds of 16-bit operations on message.pdf
ketandabbe
 
4_5769479639445540375.pptx
HHoko1
 
020-100 Certification Exam Unlock Success Dumps pdf.pdf
Aliza Oscar
 
312 50-demo
Tomas Vileikis
 
Cryptograpy Exam
Lisa Olive
 
Multi-Biometric Authentication through Hybrid Cryptographic System
MangaiK4
 
Cissp cbk final_exam-answers_v5.5
madunix
 
Information Security and IT Risk Management 1st Edition Agrawal Test Bank
bwkjrdia178
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
IOSR Journals
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
IOSR Journals
 
E017212836
IOSR Journals
 
Sy0 401-q&a-demo-cert magic
jenie Emmons
 
Download full ebook of n instant download pdf
elougabakst
 
1) Which of the following are Penetration testing methodology .docx
SONU61709
 
kasodhan2019.pdf
40NehaPagariya
 
Cryptography and Network Security Principles and Practice 6th Edition William...
jiuweimurth12
 
Information Security and IT Risk Management 1st Edition Agrawal Test Bank
eiltsjchassz5
 
Network Security(MD5)
United International University
 
Com Ed 8 Finals
bluejayjunior
 

Recently uploaded (20)

PDF
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PDF
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PDF
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
PDF
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PDF
Biography of Daniel Podor.pdf
Daniel Podor
 
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
Biography of Daniel Podor.pdf
Daniel Podor
 
Ad

Cryptography Quiz: test your knowledge of this important security concept.

  • 1. 1 1.Digital signatures provide: (Select 3 answers) A. Integrity B. Authentication C. Confidentiality D. Authorization E. Non-repudiation F. Accounting 2.In cryptography, the number of bits in a key used by a cryptographic algorithm is referred to as a key size or key length. The key length determines the maximum number of combinations required to break the encryption algorithm, therefore typically a longer key means stronger cryptographic security. A. True B. False 3. Which of the following answers refers to a type of additional input that increases password complexity and provides better protection against brute-force, dictionary, and rainbow table attacks? A. Seed B. IV C. Salt D. Shim 4. An emerging field of advanced computing technologies based on the principles of physics is known as: A. DNA computing B. Edge computing C. Quantum computing D. Fog computing 5. According to predictions, the most future-proof cryptographic solution should be: A. Quantum cryptography B. Symmetric-key cryptography C. Post-quantum cryptography D. Asymmetric-key cryptography E. Public-key cryptography 6. One of the main points of vulnerability of a system is that data in _____ is not encrypted. Cryptography Quiz July 4, 2025
  • 2. 2 A. use B. devices C. storage D. transmission 7. Cryptography is used to conceal data in transmission by the use of _____. A. encryption B. checksum C. decryption D. authentication 8. The term "Blockchain" refers to a decentralized digital ledger system (i.e. a specific type of a distributed database) stored across multiple computers in a P2P network. A. True B. False 9. Which of the following block cipher modes is the simplest/weakest and therefore not recommended for use? A. CBC B. GCM C. ECB D. CTR 10. A type of encryption scheme where the same key is used to encrypt and decrypt data is referred to as: (Select 3 answers) A. Session-key encryption B. Public-key encryption C. Symmetric encryption D. Asymmetric encryption E. Secret-key encryption Cryptography Quiz July 4, 2025
  • 3. 3 11. In asymmetric encryption, any message encrypted with the use of a public key can only be decrypted by applying the same algorithm and a matching private key (and vice versa). A. True B. False 12. Which of the algorithms listed below does not belong to the category of symmetric ciphers? A. RC4 B. DES C. RSA D. AES E. Blowfish F. 3DES G. Twofish 13. Which of the algorithms listed below does not fall into the category of asymmetric encryption? A. RSA B. GPG C. DSA D. AES E. DHE F. ECDHE G. PGP 14. What is the purpose of steganography? A. Checking data integrity B. Verifying hash values C. Hiding data within another piece of data D. Encrypting data 15. Which of the following terms applies to the authentication process? A. Digital certificate B. MFA Cryptography Quiz July 4, 2025
  • 4. 4 C. Encryption D. Security through obscurity E. Hashing 16. It takes a data in a group of same size generally to encrypt plaintext text data A. Stream Cipher B. Block Cipher C. AES D. RSA 17. Which encryption you would prefer when you need to encrypt a large amount of data A. Symmetric B. Asymmetric C. Elliptic Curve D. Stream 18. To use digital signatures, you would need the _____ key to digitally sign data, and the _____ key to verify the signature. A. hashed, decrypted B. private, public C. encrypted, decrypted D. public, private 19. A digital signature provides A. Non-repudiation B. Symmetric Encryption C. Authenticity Protection D. Integrity Protection 20. Cryptography protects data A. From being downloaded B. From Remote Code Execution C. In transit and at rest D. From DoS attack 21. Which of the following is true about Public Key Infrastructure? Cryptography Quiz July 4, 2025
  • 5. 5 A. PKI is a combination of digital certificates, public-key cryptography, and certificate authorities that provide enterprise-wide security. B. PKI uses two-way symmetric key encryption with digital certificates, and Certificate Authority. C. PKI uses private and public keys but does not use digital certificates. D. PKI uses CHAP authentication. 22. Which has a key length of 128 bits? a) IDEA b) Triple-DES c) IDEA & Triple-DES d) None of the mentioned 23. Examples of hash functions are a) MD5 b) SHA-1 c) MD5 & SHA-1 d) None of the mentioned 24.Your manager wants you to review the company’s internal PKI system’s CPS for applicability and verification and to ensure that it meets current needs. What are you most likely to focus on? A. Revocations B. Trust level provided to users C. Key entropy D. How the keys are stored 25. Cryptographic hash function takes an arbitrary block of data and returns _________ a) fixed size bit string b) variable size bit string c) both fixed size bit string and variable size bit string d) variable sized byte string Cryptography Quiz July 4, 2025