Security Quiz (General Revision)

Security Quiz (General Revision)

University

36 Qs

quiz-placeholder

Similar activities

Algebra 1 Sequence

Algebra 1 Sequence

9th Grade - University

38 Qs

Grade 10 Mathematics 1st Periodical Exam

Grade 10 Mathematics 1st Periodical Exam

10th Grade - University

40 Qs

CA-II (Vector Space-Quiz)

CA-II (Vector Space-Quiz)

University

40 Qs

FINAL EXAMINATION IN NUMBER THEORY

FINAL EXAMINATION IN NUMBER THEORY

University

35 Qs

MA8551 Algebra and Number Theory - Unit-5 Part-A&B

MA8551 Algebra and Number Theory - Unit-5 Part-A&B

University

36 Qs

MATEMATIK TINGKATAN 4

MATEMATIK TINGKATAN 4

10th Grade - University

40 Qs

Mathematics 1

Mathematics 1

University

35 Qs

Emags Quiz 2

Emags Quiz 2

University

34 Qs

Security Quiz (General Revision)

Security Quiz (General Revision)

Assessment

Quiz

Mathematics

University

Medium

Created by

Ramy Shaaban

Used 5+ times

FREE Resource

36 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following is a property of a cryptographic system (Select all that apply)

Authentication

Confidentiality

Reality

Availability

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is implemented to execute the confidentiality in the cryptographic system

Encryption

Mathematical Background

Euler Theorem

Authentication

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the difference between block cipher and stream cipher

block cipher is easier

block cipher is faster

stream cipher generate a key for each message

None of the above

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

DES is an example of

Symmetric Encryption

Assymmetric Encryption

All of the above

None of the above

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The problem of Symmetric Encryption is

Complexity

Key Exchange

Time

None of the above

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT a mode of operation in block cipher

ECB

CBC

OFB

GCD

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

to overcome the problem of the different size of the last message block, we use

reverse engineering

encryption

padding

segmentation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Mathematics