Search Header Logo

Data and Digital Communications Final Quiz

Authored by Ram More

Computers

University

Used 2+ times

Data and Digital Communications Final Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a method of concealing information from a recognizable text into encrypted form.

Decryption

Encryption

Cryptanalysis

Cryptology

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the art of creating and using cryptosystems.

Cryptanalysis

Cryptography

Cryptology

Cryptosystem

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the process of capturing the data packets traveling in the network.

Packet sniffing

Spoofing

Snooping

Masquerading

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is an attack that is aimed at preventing unauthorized users from accessing services on the network.

Man-in-the-Middle

Denial-of-Service

Trojan Horse

Spoofing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of recovering a plaintext from its ciphertext.

Encryption

Decryption

Cryptology

Cryptanalysis

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the process of verifying that the user is exactly who he/she claims to be.

Confidentiality

Authentication

Availability

Integrity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the art of ensuring that data is kept private and accessed only by the intended recipient.

Availability

Integrity

Authentication

Confidentiality

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?