Cryptography Quiz 1

Cryptography Quiz 1

University

25 Qs

quiz-placeholder

Similar activities

2626 - Exam

2626 - Exam

University

20 Qs

Blockchain Workshop

Blockchain Workshop

University

25 Qs

UNIT 2 DES,BLOCK CIPHER

UNIT 2 DES,BLOCK CIPHER

University - Professional Development

20 Qs

Ecommerce revision

Ecommerce revision

11th Grade - University

22 Qs

Switch Config and Connectivity

Switch Config and Connectivity

10th Grade - University

20 Qs

Python Files

Python Files

University

20 Qs

FDBS BSIT2B

FDBS BSIT2B

University

25 Qs

Cryptography Basics

Cryptography Basics

University

25 Qs

Cryptography Quiz 1

Cryptography Quiz 1

Assessment

Quiz

Computers

University

Hard

Created by

RYAN ANTHON SARMIENTO

Used 3+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Requires that neither the receiver nor the sender of a message be able to accept the transmission.

Non repudiation

Access Control

Availability

None of the Above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Requires that access to information resources may be controlled by or the target system.

Non repudiation

Access control

Availability

None of the Above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Requires that computer system assets be available to authorized parties when needed.

Access Control

Available

Non-repudiation

Non of the Above

4.

MULTIPLE SELECT QUESTION

45 sec • 3 pts

Most common means of providing security mechanism

Digital Signature

Non repudiation

Access Control

Encipherment

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ensures that the information in a computer system and transmitted information are accessible to all for reading by authorized parties.

TRUE

FALSE

MAYBE

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ensures that the origin of a message or electronic document is correctly identified, with an assurance that the identity is not false.

Confidentiality

Authentication

Integrity

None of the Above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ensures that the information in a computer system and transmitted information are accessible only for reading by authorized parties.

Confidentiality

Authentication

Integrity

Credibility

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?