Quiz 1

Quiz 1

University

11 Qs

quiz-placeholder

Similar activities

ITBP301_Chapter 02

ITBP301_Chapter 02

University

10 Qs

IT Participation 6

IT Participation 6

University

15 Qs

iGCSE Cryptography (2023 onwards)

iGCSE Cryptography (2023 onwards)

9th Grade - University

10 Qs

8th module23

8th module23

University

13 Qs

Unit 10 - Internet Security

Unit 10 - Internet Security

12th Grade - University

13 Qs

Data Ecryption

Data Ecryption

University

16 Qs

CNET151 Chapt 8 Encryption

CNET151 Chapt 8 Encryption

University

15 Qs

015_Key Exchange - CompTIA Security+ SY0-701 - 1.4

015_Key Exchange - CompTIA Security+ SY0-701 - 1.4

9th Grade - University

13 Qs

Quiz 1

Quiz 1

Assessment

Quiz

Computers

University

Hard

Created by

Osama Alhodairy

Used 3+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

___________are the three fundamental goals of information security

Confidentiality, Integrity, and  Availability

Classic cryptography , and

Symmetric ciphers

Public key , and cryptography

Multilevel security, and Firewalls, Authorization

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

 In cryptography, what is cipher?

algorithm for performing encryption and decryption

encrypted message

both (a) and (b)

none of the mentioned

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

. In asymmetric key cryptography, the private key is kept by _____.

sender

receiver

sender and receiver

all the connected devices to the network

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cryptanalysis is used ______.

to find some insecurity in a cryptographic scheme

to increase the speed

to encrypt the data

none of the mentioned

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A denial of service attack

can erase an entire Web site.

does not have to occur over a network.

is an intentional attempt to overload a Web server or Web site.

all of the above.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Authentication is

Passwords

Biometrics

Other methods of authentication

All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Authorization is

Access Control Lists/Capabilities

Firewalls, intrusion detection (IDS)

Multilevel security (MLS),

All of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?