
CNS-5-4-21
Authored by Sarbeswara Hota
Computers
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Symmetric key cryptography provides
Data Availability
Data Confidentiality
Data Integrity
All of these
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The use of fingerprint ensures
Availability
Integrity
Authenticity
All of these
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The use of a cryptographic hash function generates
secret key
message digest
fingerprint
All of these
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The message and message digest pair is equivalent with
document and fingerprint
document and secret key
document and public key
All of these
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The criteria of a cryptographic hash function are
preimage resistance
second preimage resistance,
collision resistance
All of these
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Given the message digest h, In which of the following criteria the attacker determines the message M' that hashes to same digest
Preimage resistance
Second preimage resistance
Collision resistance
All of these
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The message digest created by a cryptographic hash function is normally called
modification detection code
Message Authentication Code
Message integrity
None of these
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?