IAS QUIZ 12

IAS QUIZ 12

University

25 Qs

quiz-placeholder

Similar activities

Introduction to Cybersecurity Quiz

Introduction to Cybersecurity Quiz

University

24 Qs

Sistem Terdistribusi - Kuis 2 4F

Sistem Terdistribusi - Kuis 2 4F

University

20 Qs

cybersecurity worksheet

cybersecurity worksheet

9th Grade - University

29 Qs

Week 12 - Module 5 Unit 3 Using Access Control

Week 12 - Module 5 Unit 3 Using Access Control

University

20 Qs

Chapter 8. Securing Network Media and Devices

Chapter 8. Securing Network Media and Devices

University

20 Qs

Cisco LAN Security Concepts

Cisco LAN Security Concepts

University

22 Qs

IAS Finals Reviewer

IAS Finals Reviewer

University

24 Qs

Cyber Fun Password Attack Quiz

Cyber Fun Password Attack Quiz

9th Grade - University

20 Qs

IAS QUIZ 12

IAS QUIZ 12

Assessment

Quiz

Computers

University

Easy

Created by

Darwin Vargas

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Message authentication is a mechanism or service used to verify the integrity of a message.

T

F

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The order in which the frame check sequence and encryption functions are performed is not critical for authentication.

F

T

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A recipient in possession of the secret key cannot generate an authentication code to verify the integrity of the message.

F

T

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One means of forming a MAC is to combine a cryptographic hash function in some fashion with a secret key.

T

F

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A brute-force attack on a MAC is easier than a brute-force attack on a hash function.

F

T

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Message authentication may also verify sequencing and timeliness.

T

F

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The security of any MAC function based on an embedded hash function depends in some way on the cryptographic strength of the underlying hash function.

T

F

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?