
Security
Authored by Long Pham
Computers
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Three security goals are
confidentiality, cryptography, and nonrepudiation
confidentiality, encryption, and decryption
confidentiality, integrity, and availability
confidentiality, denial of service, and masquerading
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following attacks is threatening integrity?
Masquerading
Traffic Analysis
Denial of service
Encoding
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following attacks is threatening availability?
Replaying
Denial of service
Decoding
Modification
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
__________ means concealing the contents of a message by enciphering.
Steganography
Compressing
Authentication
Cryptography
5.
MULTIPLE SELECT QUESTION
20 sec • 1 pt
In a______character (or a symbol) in the plaintext is always changed to the same character (or symbol) in the ciphertext regardless of its position in the text (choose two)
Monoalphabetic cipher
Substitution cipher
Polyalphabetic cipher
Transposition cipher
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
______________means concealing the message by covering it with something else.
Cryptography
Steganography
Compressing
Authentication
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What alternative term can be used to describe asymmetric cryptographic algorithms?
public key cryptography
user key cryptography
private key cryptography
cipher-text cryptography
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?