Cryptography is the science and art of protecting information by converting it into a secure format that can only be accessed or understood by authorized parties. At its core, it involves techniques like encryption, which transforms plain text into unreadable ciphertext using algorithms and keys, and decryption, which reverses this process to retrieve the original data. This field encompasses symmetric encryption, where the same key is used for both encrypting and decrypting; asymmetric encryption, utilizing a pair of keys (public and private); and hashing, which creates a fixed-size string of characters unique to the input data for verification purposes. Cryptography plays a vital role in securing digital communications, online banking, data storage, and cybersecurity, ensuring confidentiality, integrity, and authenticity in an increasingly interconnected world.
Table of contents
- Part 1: OnlineExamMaker AI quiz generator – Save time and efforts
- Part 2: 20 cryptography quiz questions & answers
- Part 3: Automatically generate quiz questions using AI Question Generator
Part 1: OnlineExamMaker AI quiz generator – Save time and efforts
What’s the best way to create a cryptography quiz online? OnlineExamMaker is the best AI quiz making software for you. No coding, and no design skills required. If you don’t have the time to create your online quiz from scratch, you are able to use OnlineExamMaker AI Question Generator to create question automatically, then add them into your online assessment. What is more, the platform leverages AI proctoring and AI grading features to streamline the process while ensuring exam integrity.
Key features of OnlineExamMaker:
● Combines AI webcam monitoring to capture cheating activities during online exam.
● Allow the quiz taker to answer by uploading video or a Word document, adding an image, and recording an audio file.
● Automatically scores multiple-choice, true/false, and even open-ended/audio responses using AI, reducing manual work.
● OnlineExamMaker API offers private access for developers to extract your exam data back into your system automatically.
Automatically generate questions using AI
Part 2: 20 cryptography quiz questions & answers
or
Question 1:
What is the primary characteristic of symmetric encryption?
A. It uses the same key for encryption and decryption.
B. It uses different keys for encryption and decryption.
C. It is only used for digital signatures.
D. It requires a third-party certificate authority.
Answer: A
Explanation: Symmetric encryption uses a single shared key for both encrypting and decrypting data, making it faster but requiring secure key distribution.
Question 2:
Which algorithm is an example of a symmetric encryption standard?
A. RSA
B. AES
C. ECC
D. Diffie-Hellman
Answer: B
Explanation: AES (Advanced Encryption Standard) is a symmetric block cipher that uses the same key for both encryption and decryption processes.
Question 3:
What does asymmetric encryption use to secure data?
A. A single shared key
B. A public key and a private key
C. Only a private key
D. A hash function
Answer: B
Explanation: Asymmetric encryption employs a pair of keys—a public key for encryption and a private key for decryption—enabling secure communication without prior key exchange.
Question 4:
In cryptography, what is a nonce?
A. A fixed encryption key
B. A number used once to add randomness
C. A type of digital signature
D. A hashing algorithm
Answer: B
Explanation: A nonce is a random or pseudo-random number used once in cryptographic communication to prevent replay attacks and ensure uniqueness.
Question 5:
Which of the following is a hashing algorithm?
A. DES
B. SHA-256
C. RSA
D. Blowfish
Answer: B
Explanation: SHA-256 is a cryptographic hash function that produces a fixed-size output from any input data, making it ideal for data integrity and password storage.
Question 6:
What is the main purpose of a digital signature?
A. To encrypt data
B. To verify the authenticity and integrity of a message
C. To generate random keys
D. To perform key exchange
Answer: B
Explanation: Digital signatures use asymmetric cryptography to ensure that a message has not been altered and was sent by the claimed sender.
Question 7:
Which attack involves intercepting and altering communication between two parties?
A. Brute force attack
B. Man-in-the-middle attack
C. Dictionary attack
D. Rainbow table attack
Answer: B
Explanation: In a man-in-the-middle attack, an attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating.
Question 8:
What is the key length typically used in AES-128?
A. 64 bits
B. 128 bits
C. 256 bits
D. 512 bits
Answer: B
Explanation: AES-128 uses a 128-bit key length, providing a balance of security and performance for encrypting data in blocks.
Question 9:
In RSA, what is used to decrypt a message encrypted with the public key?
A. The same public key
B. A symmetric key
C. The private key
D. A hash value
Answer: C
Explanation: RSA decryption requires the private key, which is kept secret, to decrypt data that was encrypted with the corresponding public key.
Question 10:
What property ensures that a hash function cannot be reversed?
A. Collision resistance
B. One-way function
C. Key exchange
D. Encryption speed
Answer: B
Explanation: A one-way function in hashing means it is computationally infeasible to derive the original input from the hash output.
Question 11:
Which cipher mode operates on fixed-size blocks of data?
A. Stream cipher
B. Block cipher
C. Hash cipher
D. Asymmetric cipher
Answer: B
Explanation: Block ciphers, like AES, encrypt data in fixed-size blocks, typically 128 bits, whereas stream ciphers encrypt data bit by bit.
Question 12:
What is salting in the context of password storage?
A. Adding random data to a password before hashing
B. Encrypting the password with a public key
C. Storing passwords in plain text
D. Using a weak hash function
Answer: A
Explanation: Salting involves adding a unique random value to each password before hashing to prevent precomputed attacks like rainbow tables.
Question 13:
Which protocol is commonly used for secure web communication?
A. HTTP
B. SSL/TLS
C. FTP
D. SMTP
Answer: B
Explanation: SSL/TLS (Secure Sockets Layer/Transport Layer Security) provides encryption and authentication for data in transit over networks, such as web browsers.
Question 14:
What type of attack tries every possible key combination?
A. Phishing attack
B. Brute force attack
C. SQL injection
D. Denial-of-service attack
Answer: B
Explanation: A brute force attack systematically checks all possible keys or passwords until the correct one is found, though it is computationally intensive.
Question 15:
In Diffie-Hellman, what is exchanged between parties?
A. Private keys
B. Encrypted messages
C. Public values
D. Hash outputs
Answer: C
Explanation: Diffie-Hellman key exchange allows two parties to securely generate a shared secret key by exchanging public values over an insecure channel.
Question 16:
What does a cryptographic salt prevent?
A. Data encryption
B. Rainbow table attacks
C. Key generation
D. Symmetric encryption
Answer: B
Explanation: A salt adds randomness to hashed passwords, making precomputed rainbow table attacks ineffective by producing unique hashes for identical passwords.
Question 17:
Which is an example of a stream cipher?
A. AES in ECB mode
B. RC4
C. DES in CBC mode
D. RSA
Answer: B
Explanation: RC4 is a stream cipher that encrypts data one byte at a time, making it suitable for applications requiring variable data sizes.
Question 18:
What is the purpose of a certificate authority (CA) in PKI?
A. To encrypt emails
B. To issue and verify digital certificates
C. To perform hashing
D. To generate symmetric keys
Answer: B
Explanation: A certificate authority in Public Key Infrastructure (PKI) verifies and issues digital certificates that bind public keys to entities.
Question 19:
What ensures non-repudiation in cryptography?
A. Digital signatures
B. Symmetric keys
C. Plain text storage
D. Hash collisions
Answer: A
Explanation: Digital signatures provide proof of the origin of a message, ensuring the sender cannot deny having sent it.
Question 20:
Which hashing property means two different inputs produce the same output?
A. Avalanche effect
B. Collision
C. Salt resistance
D. Key length
Answer: B
Explanation: A collision in hashing occurs when two distinct inputs produce the same hash output, which good hash functions aim to minimize.
or
Part 3: Automatically generate quiz questions using OnlineExamMaker AI Question Generator
Automatically generate questions using AI