Chapter 16

Chapter 16

University

15 Qs

quiz-placeholder

Similar activities

Computer Security:Encryption

Computer Security:Encryption

10th Grade - University

10 Qs

UTS Kemanan Sistem Informasi

UTS Kemanan Sistem Informasi

University

20 Qs

KRIPTOGRAFI POLTEKAD

KRIPTOGRAFI POLTEKAD

University

20 Qs

Cryptography & Network Security Overview

Cryptography & Network Security Overview

University

15 Qs

Cryptology

Cryptology

9th Grade - University

15 Qs

Cryptography

Cryptography

6th Grade - University

15 Qs

Kriptografi

Kriptografi

University

10 Qs

ITBP301_Chapter 02

ITBP301_Chapter 02

University

10 Qs

Chapter 16

Chapter 16

Assessment

Quiz

Computers

University

Medium

Created by

Nguyễn Q Long

Used 14+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describe being secure, information needs to be hidden from unauthorized access?

Confidentiality

Integrity

Availability

Non-repudiation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes protecting data information needs to be protected from unauthorized change?

Confidentiality

Availability

Integrity

Deniel of Service

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks is threatening integrity?

Snooping

Traffic Analysis

Denial of service

Modification

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks is threatening confidentiality?

Snooping

Repudiation

Denial of service

Modification

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______ can be threatened by security attacks.

confidentiality, cryptography, and non-repudiation

confidentiality, encryption, and decryption

confidentiality, denial of service, and masquerading

confidentiality, integrity, and availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In attacks threatening integrity, ______  happens when the attacker impersonates somebody else

Snooping

Modification

Masquerading

Denial of service

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____________ means concealing the contents of a message by enciphering.

Steganography

Cryptography

Compressing

Authentication

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?