Quiz 1

Quiz 1

University

11 Qs

quiz-placeholder

Similar activities

Chapter 9

Chapter 9

University

9 Qs

Encryption

Encryption

University

12 Qs

Security

Security

12th Grade - University

12 Qs

Cyber Security

Cyber Security

9th Grade - University

14 Qs

CSP Unit 10 Cybersecurity

CSP Unit 10 Cybersecurity

12th Grade - University

13 Qs

Chapter 10: Encryption Techniques

Chapter 10: Encryption Techniques

University

10 Qs

Quiz-1 Classical Encryption Techniques

Quiz-1 Classical Encryption Techniques

University

14 Qs

Computer Security:Encryption

Computer Security:Encryption

10th Grade - University

10 Qs

Quiz 1

Quiz 1

Assessment

Quiz

Computers

University

Hard

Created by

Osama Alhodairy

Used 3+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

___________are the three fundamental goals of information security

Confidentiality, Integrity, and  Availability

Classic cryptography , and

Symmetric ciphers

Public key , and cryptography

Multilevel security, and Firewalls, Authorization

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

 In cryptography, what is cipher?

algorithm for performing encryption and decryption

encrypted message

both (a) and (b)

none of the mentioned

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

. In asymmetric key cryptography, the private key is kept by _____.

sender

receiver

sender and receiver

all the connected devices to the network

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cryptanalysis is used ______.

to find some insecurity in a cryptographic scheme

to increase the speed

to encrypt the data

none of the mentioned

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A denial of service attack

can erase an entire Web site.

does not have to occur over a network.

is an intentional attempt to overload a Web server or Web site.

all of the above.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Authentication is

Passwords

Biometrics

Other methods of authentication

All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Authorization is

Access Control Lists/Capabilities

Firewalls, intrusion detection (IDS)

Multilevel security (MLS),

All of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?