Search Header Logo

Security

Authored by Long Pham

Computers

University

Used 2+ times

Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Three security goals are

confidentiality, cryptography, and nonrepudiation

confidentiality, encryption, and decryption

confidentiality, integrity, and availability

confidentiality, denial of service, and masquerading

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following attacks is threatening integrity?

Masquerading

Traffic Analysis

Denial of service

Encoding

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following attacks is threatening availability?

Replaying

Denial of service

Decoding

Modification

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

__________ means concealing the contents of a message by enciphering.

Steganography

Compressing

Authentication

Cryptography

5.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

In a______character (or a symbol) in the plaintext is always changed to the same character (or symbol) in the ciphertext regardless of its position in the text (choose two)

Monoalphabetic cipher

Substitution cipher

Polyalphabetic cipher

Transposition cipher

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

______________means concealing the message by covering it with something else.

Cryptography

Steganography

Compressing

Authentication

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What alternative term can be used to describe asymmetric cryptographic algorithms?

public key cryptography

user key cryptography

private key cryptography

cipher-text cryptography

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers