Security Quiz (General Revision)

Security Quiz (General Revision)

University

36 Qs

quiz-placeholder

Similar activities

Coba Diseriusin

Coba Diseriusin

University

35 Qs

Angle Addition

Angle Addition

10th Grade - University

41 Qs

Introduction to Statistics

Introduction to Statistics

University

37 Qs

PMPE

PMPE

University

40 Qs

Chapter 5 Monster Review

Chapter 5 Monster Review

10th Grade - University

40 Qs

MC on Grouped Frequency Distribution and Graphs

MC on Grouped Frequency Distribution and Graphs

9th Grade - Professional Development

40 Qs

Matrices

Matrices

University

31 Qs

Security Quiz (General Revision)

Security Quiz (General Revision)

Assessment

Quiz

Mathematics

University

Practice Problem

Medium

Created by

Ramy Shaaban

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

36 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following is a property of a cryptographic system (Select all that apply)

Authentication

Confidentiality

Reality

Availability

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is implemented to execute the confidentiality in the cryptographic system

Encryption

Mathematical Background

Euler Theorem

Authentication

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the difference between block cipher and stream cipher

block cipher is easier

block cipher is faster

stream cipher generate a key for each message

None of the above

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

DES is an example of

Symmetric Encryption

Assymmetric Encryption

All of the above

None of the above

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The problem of Symmetric Encryption is

Complexity

Key Exchange

Time

None of the above

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT a mode of operation in block cipher

ECB

CBC

OFB

GCD

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

to overcome the problem of the different size of the last message block, we use

reverse engineering

encryption

padding

segmentation

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?