
CNS-2023
Authored by Shubha V
Computers
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
OPEN ENDED QUESTION
1 min • Ungraded
USN
Evaluate responses using AI:
OFF
2.
OPEN ENDED QUESTION
1 min • Ungraded
Name
Evaluate responses using AI:
OFF
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
_______ is the science and art of transforming messages to make them secure and immune to attacks
Cryptography
Calligraphy
Cryptanalysis
None of the above
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
In symmetric-key cryptography, the key locks and unlocks the box is
different
same
private
public
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Encryption Strength is based on
Length of key
Secrecy of key
Strength of algorithm
All of the above
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In asymmetric key cryptography, the private key is kept by ________
Sender
Receiver
All the connected devices to the network
Sender and receiver
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In cryptography, the order of letters in a message is rearranged by ________
Transpositional ciphers
Substitution ciphers
Both (A) and (B)
Quadratic ciphers
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?