Data and Digital Communications Final Quiz

Data and Digital Communications Final Quiz

University

10 Qs

quiz-placeholder

Similar activities

Type of Attacks

Type of Attacks

University

9 Qs

Types of Attack

Types of Attack

University

10 Qs

Croteau SY110 L18&19 AY25

Croteau SY110 L18&19 AY25

University

6 Qs

Cryptography and Computer Security Quiz 4

Cryptography and Computer Security Quiz 4

University

15 Qs

Ecommerce Security

Ecommerce Security

University

10 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

10 Qs

Cryptology

Cryptology

9th Grade - University

15 Qs

KRIPTOGRAFI KLP 2 MENYALA ABANGKUH

KRIPTOGRAFI KLP 2 MENYALA ABANGKUH

University

15 Qs

Data and Digital Communications Final Quiz

Data and Digital Communications Final Quiz

Assessment

Quiz

Computers

University

Medium

Created by

Ram More

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a method of concealing information from a recognizable text into encrypted form.

Decryption

Encryption

Cryptanalysis

Cryptology

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the art of creating and using cryptosystems.

Cryptanalysis

Cryptography

Cryptology

Cryptosystem

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the process of capturing the data packets traveling in the network.

Packet sniffing

Spoofing

Snooping

Masquerading

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is an attack that is aimed at preventing unauthorized users from accessing services on the network.

Man-in-the-Middle

Denial-of-Service

Trojan Horse

Spoofing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of recovering a plaintext from its ciphertext.

Encryption

Decryption

Cryptology

Cryptanalysis

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the process of verifying that the user is exactly who he/she claims to be.

Confidentiality

Authentication

Availability

Integrity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the art of ensuring that data is kept private and accessed only by the intended recipient.

Availability

Integrity

Authentication

Confidentiality

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?