Cryptography Quiz 1

Cryptography Quiz 1

University

25 Qs

quiz-placeholder

Similar activities

Cryptography

Cryptography

University - Professional Development

20 Qs

Quiz 1 - Basic Cryptography

Quiz 1 - Basic Cryptography

University

20 Qs

IAS QUIZ 9

IAS QUIZ 9

University

25 Qs

IT Security 05

IT Security 05

University

20 Qs

BSA - Elec - Finals

BSA - Elec - Finals

University

20 Qs

Transport Layer Security

Transport Layer Security

University

20 Qs

SSL/TLS

SSL/TLS

University

20 Qs

Cyber Security

Cyber Security

University

23 Qs

Cryptography Quiz 1

Cryptography Quiz 1

Assessment

Quiz

Computers

University

Hard

Created by

RYAN ANTHON SARMIENTO

Used 3+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Requires that neither the receiver nor the sender of a message be able to accept the transmission.

Non repudiation

Access Control

Availability

None of the Above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Requires that access to information resources may be controlled by or the target system.

Non repudiation

Access control

Availability

None of the Above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Requires that computer system assets be available to authorized parties when needed.

Access Control

Available

Non-repudiation

Non of the Above

4.

MULTIPLE SELECT QUESTION

45 sec • 3 pts

Most common means of providing security mechanism

Digital Signature

Non repudiation

Access Control

Encipherment

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ensures that the information in a computer system and transmitted information are accessible to all for reading by authorized parties.

TRUE

FALSE

MAYBE

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ensures that the origin of a message or electronic document is correctly identified, with an assurance that the identity is not false.

Confidentiality

Authentication

Integrity

None of the Above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ensures that the information in a computer system and transmitted information are accessible only for reading by authorized parties.

Confidentiality

Authentication

Integrity

Credibility

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?