Security Quiz (General Revision)

Security Quiz (General Revision)

University

36 Qs

quiz-placeholder

Similar activities

MTS 101 PRE-EXAM

MTS 101 PRE-EXAM

University

40 Qs

Preparatory Aptitude Test-1

Preparatory Aptitude Test-1

University

40 Qs

Math 1100/1120 quiz 1_ Transcended

Math 1100/1120 quiz 1_ Transcended

University

32 Qs

Quiz 7-9_Abstract

Quiz 7-9_Abstract

University

35 Qs

EDMATH 304 - NUMBER THEORY

EDMATH 304 - NUMBER THEORY

University

40 Qs

IAT-II MA8551 Algebra and Number Theory

IAT-II MA8551 Algebra and Number Theory

University

40 Qs

Math Contest Questions (Hard Level)

Math Contest Questions (Hard Level)

12th Grade - University

38 Qs

Mathematics 1

Mathematics 1

University

35 Qs

Security Quiz (General Revision)

Security Quiz (General Revision)

Assessment

Quiz

Mathematics

University

Medium

Created by

Ramy Shaaban

Used 5+ times

FREE Resource

36 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following is a property of a cryptographic system (Select all that apply)

Authentication

Confidentiality

Reality

Availability

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is implemented to execute the confidentiality in the cryptographic system

Encryption

Mathematical Background

Euler Theorem

Authentication

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the difference between block cipher and stream cipher

block cipher is easier

block cipher is faster

stream cipher generate a key for each message

None of the above

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

DES is an example of

Symmetric Encryption

Assymmetric Encryption

All of the above

None of the above

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The problem of Symmetric Encryption is

Complexity

Key Exchange

Time

None of the above

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT a mode of operation in block cipher

ECB

CBC

OFB

GCD

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

to overcome the problem of the different size of the last message block, we use

reverse engineering

encryption

padding

segmentation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?