Search Header Logo
Information network and security

Information network and security

Assessment

Presentation

Education, Other

University

Hard

Created by

Rakheeba Taseen

Used 2+ times

FREE Resource

1 Slide • 21 Questions

1

Information and network and security

Quiz 1

Slide image

2

Fill in the Blank

The art of breaking Secret code

3

Multiple Choice

Meaning of Crypto

1

Cryptology

2

Cryptography

3

Cryptanalysis

4

Above all

4

Fill in the Blank

The art and science of making and breaking “secret codes”

5

Fill in the Blank

What is the ciphertext for "allthebest" with key n=5

6

Multiple Choice

Brute force approach is known as

1

Extensive search

2

Exhaustive search

3

extensive key search

4

Exhaustive key search

7

Multiple Choice

In a symmetric cipher how many keys will be there

1

1

2

2

3

none

4

3

8

Multiple Choice

public key crypto uses how many keys for encryption

1

1

2

2

3

none

9

Multiple Choice

One-Time Pad is also knowns

1

ceaser cipher

2

block cipher

3

Vernam cipher

10

Multiple Choice

which among this is the real time example for vernam cipher

1

Project Verna

2

Project Venona

11

Fill in the Blank

The process of converting plaintext to ciphertext is called

12

Fill in the Blank

The process of converting ciphertext into plaintext is called

13

Multiple Choice

Code book cipher is a

1

Book

2

dictionary

14

Multiple Choice

Arthur zimmerman was

1

president

2

German Ambassador

3

Foreign Minister

4

External affair minister

15

Multiple Choice

Zimmerman telegram is an example of

1

Double transposition

2

Onetime pad

3

Ceaser cipher

4

codebook

16

Fill in the Blank

In 1876 the electoral college delegations of how many states were in dispute

17

Multiple Choice

The contestants of 1876 election were

1

zimmerman and Rutherford B. Hayes

2

Rutherford B. Hayes and Samuel J. Tilden

3

Samuel J. Tilden and zimmerman

18

Multiple Choice

. Name the author who published the paper, "Information Theory of Secrecy Systems "

1

Claude Shannon

2

Zimmerman

19

Multiple Choice

The term associated with the process of converting ordinary plain text into unintelligible text and vice-versa is called

1

Cryptology

2

crypto

3

cryptography

20

Fill in the Blank

The term "-----------" refers to the idea that a user's computer, with the ability to decrypt, is available to an attacker while the user is out to lunch

21

Multiple Choice

What is cipher

1

encryption

2

Decryption

3

algorithm

4

None

22

Multiple Choice

In a symmetric cipher how many keys will be there

1

1

2

2

3

none

Information and network and security

Quiz 1

Slide image

Show answer

Auto Play

Slide 1 / 22

SLIDE