6441-w8-revision

6441-w8-revision

University

9 Qs

quiz-placeholder

Similar activities

Cybersecurity 101

Cybersecurity 101

University

10 Qs

Intro to Cybersecurity

Intro to Cybersecurity

University

13 Qs

Security Basic (Topic 1 Part 1)

Security Basic (Topic 1 Part 1)

University

6 Qs

RnC Global Townhall

RnC Global Townhall

University

10 Qs

ISO 10006 and 27000

ISO 10006 and 27000

University

8 Qs

Cyber Security 101

Cyber Security 101

University

10 Qs

Security Management Lecture 1 Review I

Security Management Lecture 1 Review I

University

7 Qs

DFS40043 TOPIC 2

DFS40043 TOPIC 2

University

8 Qs

6441-w8-revision

6441-w8-revision

Assessment

Quiz

Other

University

Hard

Created by

Sage B

Used 3+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a type 1 error is someone who isn't you unlocking your phone with a fingerprint reader, what's the corresponding type 2 error?

Someone guessing your pin

The money they transfer themself while in your phone

Someone who isn't you getting in using face ID

Getting locked out of your phone when it can't recognise your fingerprint

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

A

B

C

D

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice wants to send a private message to bob. What's the first step using RSA?

Alice encrypts the message using her private key

Alice encrypts the message using her public key

Alice encrypts the message using Bob's public key

Alice encrypts the message using Bob's private key

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is NOT an example of security by obscurity

Hiding a key under a rock

Security guard by the access card readers in the entrance of a building

making it illegal to publish the source code for COVID tracing softwarM

Obfuscated code

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many of these password hints are helpful?

- Passwords should expire every 6 months

- Complexity requirements - e.g. one capital letter, number, symbol

- Passwords should be compared agains breach databse and rejected if there is a match

0

1

2

3

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A MAC is designed to provide

Neither Confidentiality nor Integrity

Integrity but not Confidentiality

Confidentiality but not Integrity

Confidentiality and Integrity

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Given a cryptographic hash function, which is most likely easier:

Finding two different messages with identical hash values

Given the hash of a message, finding the original message

Given a hash value, finding a message which hashes to that val

Containing Horses

8.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

How many bits of security does a padlock with 3 pins have?

3

8

10

1000

9.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

How many bits to represent the decimal 2000?