2. Cybersecurity Fundamentals
Cryptography — Quiz
Test your understanding of cryptography with 5 practice questions.
Practice Questions
Question 1
Which cryptographic primitive is essential for establishing a secure communication channel by allowing two parties to agree on a shared secret key over an insecure medium?
Question 2
In public-key cryptography, what mathematical concept underpins the security of key pairs, making it computationally infeasible to derive the private key from the public key?
Question 3
Which of the following scenarios best illustrates the application of a cryptographic hash function for data integrity?
Question 4
Consider a scenario where a company needs to store user passwords securely. Which key management practice is most crucial to prevent unauthorized access to these passwords, even if the database is breached?
Question 5
What is the primary advantage of using forward secrecy in cryptographic key management for communication protocols?
