Search Header Logo

CNS-5-4-21

Authored by Sarbeswara Hota

Computers

University

Used 2+ times

CNS-5-4-21
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Symmetric key cryptography provides

Data Availability

Data Confidentiality

Data Integrity

All of these

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The use of fingerprint ensures

Availability

Integrity

Authenticity

All of these

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The use of a cryptographic hash function generates

secret key

message digest

fingerprint

All of these

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The message and message digest pair is equivalent with

document and fingerprint

document and secret key

document and public key

All of these

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The criteria of a cryptographic hash function are

preimage resistance

second preimage resistance,

collision resistance

All of these

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Given the message digest h, In which of the following criteria the attacker determines the message M' that hashes to same digest

Preimage resistance

Second preimage resistance

Collision resistance

All of these

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The message digest created by a cryptographic hash function is normally called

modification detection code

Message Authentication Code

Message integrity

None of these

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?