Cryptography and Network Security Quiz 3

Cryptography and Network Security Quiz 3

University

10 Qs

quiz-placeholder

Similar activities

GDPR

GDPR

University

10 Qs

Cybersecurity 1

Cybersecurity 1

5th Grade - University

12 Qs

2.2 Methods of Error Detection Cambridge IGCSE 0478

2.2 Methods of Error Detection Cambridge IGCSE 0478

10th Grade - University

11 Qs

Kriptografi

Kriptografi

University

10 Qs

Basic Computer Skills Northstar

Basic Computer Skills Northstar

University

13 Qs

TAC3121-Quiz 6

TAC3121-Quiz 6

University

10 Qs

Quiz 9 Keamanan Jaringan

Quiz 9 Keamanan Jaringan

University

5 Qs

Chapter 5: Privacy

Chapter 5: Privacy

University

10 Qs

Cryptography and Network Security Quiz 3

Cryptography and Network Security Quiz 3

Assessment

Quiz

Instructional Technology, Computers

University

Hard

Created by

Jainulabudeen S A K

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

X.509 defines alternative authentication protocols based on the use of _______ key certificates

Public

Private

Hybrid

Master

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In S/MIME certificate processing A User's public key must be registered with a certificate authority in order to receive an _______ key

X.509 Private

X.507 Public

X.509 Public

X.507 Private

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A full service kerberos environment consisting of a _________

Servers

Clients

Application Servers

All the mentioned

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The simplest ________ attack is one in which the opponent simply copies a message and reply later

React

Counter

Reply

None Mentioned

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____________ is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss or compromise

Email hacking

Email Protection

Email Safeguarding

Email Security

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Using email hacking illicit hackers can send & spread _____ virus _____ and spam emails

Cracked software, redirected malicious URLs

Malware, Security Patches

Antivirus, Patches C

Trojans, Redirected Malicious URLs

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If the data stored in the __ is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie

Hard drive

Quarantine

Cookies

Memory

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Instructional Technology