Surprise Test

Surprise Test

University

40 Qs

quiz-placeholder

Similar activities

BSMA - COMPAP Quiz 2 Final

BSMA - COMPAP Quiz 2 Final

University

45 Qs

Pertemuan 2 Network Classificasion

Pertemuan 2 Network Classificasion

University

43 Qs

Information Warfare Quiz

Information Warfare Quiz

University

39 Qs

Income from Salary

Income from Salary

University

41 Qs

BTVTED 2 Midterm Exam

BTVTED 2 Midterm Exam

University

40 Qs

POA C3-2 FFA Meetings

POA C3-2 FFA Meetings

KG - University

43 Qs

Second Discourse Review Quiz

Second Discourse Review Quiz

University

36 Qs

Introduction to Computing MIDTERM

Introduction to Computing MIDTERM

University

39 Qs

Surprise Test

Surprise Test

Assessment

Quiz

Professional Development

University

Medium

Created by

Geetha M

Used 4+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Cryptography is

the art of encoding information in a format that

only the intended recipients can decode.

replete with object lessons on the design of secure systems, drawn from real-world situations and system security failures.

used to provide proof of the authenticity of information, in a manner analogous to the use of signatures in conventional transactions.

used to protect the integrity and privacy of information and other resources belonging to individuals and organizations is pervasive in both the physical and the digital world.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is encryption?
When you put data / text into code making it difficult to read or understand.
A secret or disguised way of writing; a code.
A formal language designed to communicate instructions to a machine
What is put in, taken in, or operated on by any process or system.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?

hash

one-time pad

symmetric

asymmetric

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

symmetric

transposition

one-time pad

asymmetric

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Hacking refers to:

Data access without permission

Data updating without permission

Data deletion without permission

Data theft

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What do you mean by a Digital Certificate?


1:verifying to a third party that a message or a document is an unaltered copy of one produced by the signer.

2.the data which has been digitally signed or encrypted by any private key can solely be decrypted by its identical public key

1 is true but not 2

Both 1 and 2 are true

Both 1 and 2 are false

2 is true but not 1

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the RSA public key cryptosystem, which one of the following numbers will always be largest?

e

n

p

q

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?