This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

Symmetric & Asymmetric Cryptography Review

| See more in Information Technology

In this game, you'll review of symmetric, asymmetric, and hashing encryption algorithms

TBaeten
By
Created Date 03.19.15
Last Updated 03.19.15
Viewed 106 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
submit to reddit

Would you like to build your own game?

It's easy!

Go to the GameBuilder and get started!

Topics of this game:
  • An attacker can use which of the following to steal a user's password if the password isn't strong and unique?
  • What's the name of the chip located on a motherboard that provides cryptograghic services?
  • Which of the following is a one-way process that can't be used to reveal the original data?
  • One of the software programs below has been purchased by Symantec and is proprietary and the other is open source. Which software program is open source?
  • Which of the following is not a symmetric encryption algorithm?
  • Linux and Mac OS strengthen the hashes of password files by adding the following:
  • Which of the following tools can't be used for whole disk encryption?
  • Which of the following ciphers is more secure?
  • Which of the following is not an asymmetric algorithm?
  • Hashing provides which of the following?
  • Which family of encryption algorithms uses both a public key and a private key?
  • How many keys are used in symmetric cryptography?
  • What encryption tool is built into the Microsoft Windows operating system to encrypt individual files and folders?
  • Which of the following is faster?
  • Which of the following is not a hash algorithm?