Cryptography Quiz 1

Cryptography Quiz 1

University

25 Qs

quiz-placeholder

Similar activities

Final - Introduction to Cryptography & Quantum Computing

Final - Introduction to Cryptography & Quantum Computing

University

20 Qs

Cryptography Basics

Cryptography Basics

University

20 Qs

IAS CH3 QUIZ

IAS CH3 QUIZ

University

25 Qs

Computer Security 1

Computer Security 1

University

30 Qs

IAS CH6 QUIZ

IAS CH6 QUIZ

University

30 Qs

เข้ารหัสผลไม้

เข้ารหัสผลไม้

University

20 Qs

Substitution Cipher

Substitution Cipher

University

20 Qs

NOSQL

NOSQL

University

20 Qs

Cryptography Quiz 1

Cryptography Quiz 1

Assessment

Quiz

Computers

University

Hard

Created by

RYAN ANTHON SARMIENTO

Used 3+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Requires that neither the receiver nor the sender of a message be able to accept the transmission.

Non repudiation

Access Control

Availability

None of the Above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Requires that access to information resources may be controlled by or the target system.

Non repudiation

Access control

Availability

None of the Above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Requires that computer system assets be available to authorized parties when needed.

Access Control

Available

Non-repudiation

Non of the Above

4.

MULTIPLE SELECT QUESTION

45 sec • 3 pts

Most common means of providing security mechanism

Digital Signature

Non repudiation

Access Control

Encipherment

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ensures that the information in a computer system and transmitted information are accessible to all for reading by authorized parties.

TRUE

FALSE

MAYBE

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ensures that the origin of a message or electronic document is correctly identified, with an assurance that the identity is not false.

Confidentiality

Authentication

Integrity

None of the Above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ensures that the information in a computer system and transmitted information are accessible only for reading by authorized parties.

Confidentiality

Authentication

Integrity

Credibility

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?