Search Header Logo

Security+Q3

Authored by Mrinmoy Purkayastha

Computers

University

Used 4+ times

Security+Q3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Changing the original text to a secret message using cryptography is known as which of the following?

encryption

hashing

algorithm

coding

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A mathematical value entered into the algorithm to produce ciphertext, or text that is “scrambled” is known as which of the following?

cipher

cleartext

key

blocktext

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The process of proving that a user performed an action, such as sending an email message, is known as which of the following?

steganography

obfuscation

availability

non-repudiation

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which cryptography algorithm was approved by the NIST in late 2000 as a replacement for DES?

RC1

AES

IDEA

Blowfish

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Cryptography can also be applied to entire disks. This is known as which of the following?

Elliptic Curve Cryptography

Digital Signature Algorithm

Trusted Platform Module

Full disk encryption

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which encryption option is essentially a chip on the motherboard of the computer that provides cryptographic services?

SED

TPM

FDE

PGP

7.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

____ cryptographic algorithms use the same single key to encrypt and decrypt a message.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers