CNS-5-4-21

CNS-5-4-21

University

14 Qs

quiz-placeholder

Similar activities

Algo Quiz

Algo Quiz

University

16 Qs

Server Administration- Quiz 1

Server Administration- Quiz 1

12th Grade - University

10 Qs

Computer Science (1-9) - Identifying & Preventing Threats

Computer Science (1-9) - Identifying & Preventing Threats

University

11 Qs

Computer Science: CPU performance

Computer Science: CPU performance

University

13 Qs

uas-siber

uas-siber

University

10 Qs

Recording Software Button Identification Quiz

Recording Software Button Identification Quiz

8th Grade - University

10 Qs

Computer Hardware foundation degree 1

Computer Hardware foundation degree 1

University

12 Qs

Operating System - Chapter 1-1

Operating System - Chapter 1-1

University

10 Qs

CNS-5-4-21

CNS-5-4-21

Assessment

Quiz

Computers

University

Hard

Created by

Sarbeswara Hota

Used 2+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Symmetric key cryptography provides

Data Availability

Data Confidentiality

Data Integrity

All of these

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The use of fingerprint ensures

Availability

Integrity

Authenticity

All of these

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The use of a cryptographic hash function generates

secret key

message digest

fingerprint

All of these

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The message and message digest pair is equivalent with

document and fingerprint

document and secret key

document and public key

All of these

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The criteria of a cryptographic hash function are

preimage resistance

second preimage resistance,

collision resistance

All of these

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Given the message digest h, In which of the following criteria the attacker determines the message M' that hashes to same digest

Preimage resistance

Second preimage resistance

Collision resistance

All of these

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The message digest created by a cryptographic hash function is normally called

modification detection code

Message Authentication Code

Message integrity

None of these

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?