Cyber Security

Cyber Security

University

23 Qs

quiz-placeholder

Similar activities

Cybersecurity Essentials Chapter 5 Review

Cybersecurity Essentials Chapter 5 Review

9th Grade - University

20 Qs

Cybersecurity Essentials Chapter 2 Review

Cybersecurity Essentials Chapter 2 Review

9th Grade - University

20 Qs

IAS QUIZ 12

IAS QUIZ 12

University

25 Qs

BAB 11

BAB 11

University

20 Qs

IAS QUIZ 11

IAS QUIZ 11

University

25 Qs

Blockchain Computer Science

Blockchain Computer Science

University

19 Qs

Computer Science Blockchain

Computer Science Blockchain

University

19 Qs

Network Security 2

Network Security 2

University

21 Qs

Cyber Security

Cyber Security

Assessment

Quiz

Computers

University

Hard

Created by

Judgi Nagarajan

Used 37+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

1.     In an asymmetric -key cipher, the sender uses the …………….key

Private

Public

none of the above

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In an asymmetric -key cipher, the receiver uses the …………….key

Private

Public

none of the above

3.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

1.     One commonly used public-key cryptography method is the …………………….algorithm

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In public key cryptosystem which is kept as public?

     Encryption keys

     Decryption keys

     Encryption and Decryption keys

   None of the above

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A cryptographic hash function has variable output length.

True

False

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

          ........................... is a famous technological medium for the spread of malware,facing problems of spam, & phishing attacks.

Cloud

Website

Pen drive

email

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In RSA, Ф(n) = in terms of p and q

(p)/(q)

(p)(q)

(p-1)(q-1)

(p+1)(q+1)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?