Cipher Challenge : Cryptography Essentials

1. Three main goals of cryptography are to ensure

  • A Confidentiality, Authorization and Revocation
  • B Data Confidentiality, Data Integrity and Authentication 
  • C Authentication, Authorization and Non-Repudiation
  • D Location Verification, Data Filtering and Data Integrity

2. RSA is an example of Asymmetric Cryptosystem.

  • A True
  • B False

3. Crypto system in which same key is used to encrypt and decrypt is called 

  • A Asymmetric Cryptosystem
  • B Symmetric Cryptosystem

4. Crypto system in which a pair of keys are used – if one key is used for encryption, then the other key will be required to decrypt – is called

  • A Asymmetric Cryptosystem 
  • B Symmetric Cryptosystem

5. Data Confidentiality is being guaranteed by using a method called

  • A Hashing
  • B Digital Signature
  • C Encryption and Decryption
  • D HMAC

Please enter your name