Metadata
Technology & Computer Science Adult Learning Remember Medium-
Subject
Technology & Computer Science
-
Education level
Adult Learning
-
Cognitive goals
Remember
-
Difficulty estimate
Medium
-
Tags
cryptography, encryption, hashing, digital signatures, key exchange, algorithms
-
Number of questions
5
-
Created on
-
Generation source
-
License
CC0 Public domain
-
Prompt
Assess learners' ability to identify and classify common cryptographic algorithms (symmetric, asymmetric, hashing, MACs, stream/hybrid) and recall their primary uses—confidentiality, integrity, authentication, digital signatures, and key exchange—with representative examples such as AES, RSA, ECC, SHA-2, HMAC, and ChaCha20.
Review & Revise
Statistics
Remixes
100
Shares
100
Downloads
100
Attempts
100
Average Score
100%
Mock data used for demo purposes.