Cryptography and Network Security Quiz 3

Cryptography and Network Security Quiz 3

University

10 Qs

quiz-placeholder

Similar activities

Quiz Penulisan Surel Kelas 9 Ganjil

Quiz Penulisan Surel Kelas 9 Ganjil

9th Grade - University

10 Qs

2022-2023 ISA Part 1 Finals

2022-2023 ISA Part 1 Finals

University

12 Qs

Protocolos de seguridad

Protocolos de seguridad

University

10 Qs

Initial Assessment - Cybersecurity Awareness

Initial Assessment - Cybersecurity Awareness

9th Grade - Professional Development

10 Qs

Email Revision .

Email Revision .

6th Grade - University

15 Qs

Phishing Quiz

Phishing Quiz

University

10 Qs

Network Forensics and Log Capturing

Network Forensics and Log Capturing

University

15 Qs

CPT 209 Chapter 1 Did You Know

CPT 209 Chapter 1 Did You Know

University - Professional Development

14 Qs

Cryptography and Network Security Quiz 3

Cryptography and Network Security Quiz 3

Assessment

Quiz

Instructional Technology, Computers

University

Hard

Created by

Jainulabudeen S A K

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

X.509 defines alternative authentication protocols based on the use of _______ key certificates

Public

Private

Hybrid

Master

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In S/MIME certificate processing A User's public key must be registered with a certificate authority in order to receive an _______ key

X.509 Private

X.507 Public

X.509 Public

X.507 Private

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A full service kerberos environment consisting of a _________

Servers

Clients

Application Servers

All the mentioned

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The simplest ________ attack is one in which the opponent simply copies a message and reply later

React

Counter

Reply

None Mentioned

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____________ is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss or compromise

Email hacking

Email Protection

Email Safeguarding

Email Security

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Using email hacking illicit hackers can send & spread _____ virus _____ and spam emails

Cracked software, redirected malicious URLs

Malware, Security Patches

Antivirus, Patches C

Trojans, Redirected Malicious URLs

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If the data stored in the __ is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie

Hard drive

Quarantine

Cookies

Memory

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Instructional Technology