Search Header Logo

6441-w8-revision

Authored by Sage B

Other

University

Used 3+ times

6441-w8-revision
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a type 1 error is someone who isn't you unlocking your phone with a fingerprint reader, what's the corresponding type 2 error?

Someone guessing your pin

The money they transfer themself while in your phone

Someone who isn't you getting in using face ID

Getting locked out of your phone when it can't recognise your fingerprint

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

A

B

C

D

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice wants to send a private message to bob. What's the first step using RSA?

Alice encrypts the message using her private key

Alice encrypts the message using her public key

Alice encrypts the message using Bob's public key

Alice encrypts the message using Bob's private key

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is NOT an example of security by obscurity

Hiding a key under a rock

Security guard by the access card readers in the entrance of a building

making it illegal to publish the source code for COVID tracing softwarM

Obfuscated code

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many of these password hints are helpful?

- Passwords should expire every 6 months

- Complexity requirements - e.g. one capital letter, number, symbol

- Passwords should be compared agains breach databse and rejected if there is a match

0

1

2

3

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A MAC is designed to provide

Neither Confidentiality nor Integrity

Integrity but not Confidentiality

Confidentiality but not Integrity

Confidentiality and Integrity

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Given a cryptographic hash function, which is most likely easier:

Finding two different messages with identical hash values

Given the hash of a message, finding the original message

Given a hash value, finding a message which hashes to that val

Containing Horses

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?