CNS-5-4-21

CNS-5-4-21

University

14 Qs

quiz-placeholder

Similar activities

Computer Programming

Computer Programming

University

10 Qs

Python Quiz 1.4

Python Quiz 1.4

University

12 Qs

A level Y12 Data Representation - Numbers SETS

A level Y12 Data Representation - Numbers SETS

11th Grade - University

18 Qs

Python_Quiz_2

Python_Quiz_2

University

15 Qs

Android

Android

University

10 Qs

Fun Games :) Fastest Fingers First.

Fun Games :) Fastest Fingers First.

10th Grade - Professional Development

13 Qs

2.GRADE STORY 5

2.GRADE STORY 5

2nd Grade - University

15 Qs

مراجعة الفصل الثاني (مقدمة تطبيقات الحاسب)

مراجعة الفصل الثاني (مقدمة تطبيقات الحاسب)

University

9 Qs

CNS-5-4-21

CNS-5-4-21

Assessment

Quiz

Computers

University

Hard

Created by

Sarbeswara Hota

Used 2+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Symmetric key cryptography provides

Data Availability

Data Confidentiality

Data Integrity

All of these

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The use of fingerprint ensures

Availability

Integrity

Authenticity

All of these

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The use of a cryptographic hash function generates

secret key

message digest

fingerprint

All of these

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The message and message digest pair is equivalent with

document and fingerprint

document and secret key

document and public key

All of these

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The criteria of a cryptographic hash function are

preimage resistance

second preimage resistance,

collision resistance

All of these

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Given the message digest h, In which of the following criteria the attacker determines the message M' that hashes to same digest

Preimage resistance

Second preimage resistance

Collision resistance

All of these

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The message digest created by a cryptographic hash function is normally called

modification detection code

Message Authentication Code

Message integrity

None of these

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?