Security+Q3

Security+Q3

University

10 Qs

quiz-placeholder

Similar activities

Exploring Cryptography Concepts

Exploring Cryptography Concepts

University

10 Qs

tln elements

tln elements

University

13 Qs

012_Public Key Infrastructure - CompTIA Security+ Sy0-701 - 1.4

012_Public Key Infrastructure - CompTIA Security+ Sy0-701 - 1.4

12th Grade - University

15 Qs

TAC3121-Quiz 5

TAC3121-Quiz 5

University

10 Qs

Cryptography and Computer Security Quiz 4

Cryptography and Computer Security Quiz 4

University

15 Qs

Croteau SY110 L18&19 AY25

Croteau SY110 L18&19 AY25

University

6 Qs

Chapter 6 (Fundamentals of Cybersecurity

Chapter 6 (Fundamentals of Cybersecurity

University

10 Qs

Cryptology

Cryptology

9th Grade - University

15 Qs

Security+Q3

Security+Q3

Assessment

Quiz

Computers

University

Easy

Created by

Mrinmoy Purkayastha

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Changing the original text to a secret message using cryptography is known as which of the following?

encryption

hashing

algorithm

coding

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A mathematical value entered into the algorithm to produce ciphertext, or text that is “scrambled” is known as which of the following?

cipher

cleartext

key

blocktext

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The process of proving that a user performed an action, such as sending an email message, is known as which of the following?

steganography

obfuscation

availability

non-repudiation

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which cryptography algorithm was approved by the NIST in late 2000 as a replacement for DES?

RC1

AES

IDEA

Blowfish

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Cryptography can also be applied to entire disks. This is known as which of the following?

Elliptic Curve Cryptography

Digital Signature Algorithm

Trusted Platform Module

Full disk encryption

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which encryption option is essentially a chip on the motherboard of the computer that provides cryptographic services?

SED

TPM

FDE

PGP

7.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

____ cryptographic algorithms use the same single key to encrypt and decrypt a message.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?