
Network Security Unit I
Authored by Trushita Chaware
Science, Computers
University
Used 11+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which technique is used in the following
a) a graduate student uses watermark to protect her thesis.
b) A student writes the answer on a small piece of paper, rolls up the paper and inserts it in a ball pen and passes pen to other student.
Cryptography
Substitution Cipher
Stenography
None of these
2.
OPEN ENDED QUESTION
30 sec • Ungraded
Write three important goals of Security.
Evaluate responses using AI:
OFF
3.
FILL IN THE BLANKS QUESTION
30 sec • 1 pt
A cipher (a) replaces one symbol by another.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
The plaintext is hello and ciphertext is KHOOR.
Which cipher is this?
Monoalphabetic
Polyalphabetic
Caesar
Hill Cipher
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the ciphertext for hello using key 15.
XUBBE
USZZC
WTAAD
HELLO
6.
FILL IN THE BLANKS QUESTION
30 sec • 1 pt
Which security mechanism is provided when
A school demands student identification and a password to let students log onto the school server.
(a)
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
After how many rounds DES is actually secure?
16
7
10
8
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?