Security Essentials - Encryptie herhaling

Security Essentials - Encryptie herhaling

Professional Development

11 Qs

quiz-placeholder

Similar activities

 Foundations of Deep Learning and Neural Networks

Foundations of Deep Learning and Neural Networks

Professional Development

16 Qs

Внешний ip-адрес

Внешний ip-адрес

University - Professional Development

10 Qs

KPI Advanced

KPI Advanced

Professional Development

15 Qs

MAINSAVER 12.6 WEB MODULE TRAINING RECORD: NON ENGINEERS

MAINSAVER 12.6 WEB MODULE TRAINING RECORD: NON ENGINEERS

Professional Development

12 Qs

Quiz Evaluasi 1 Mapel DPJK

Quiz Evaluasi 1 Mapel DPJK

Professional Development

15 Qs

JSKBS - Database Management System

JSKBS - Database Management System

Professional Development

15 Qs

Mapeamento e Normalização BD

Mapeamento e Normalização BD

University - Professional Development

15 Qs

JSKBS - Computer Applications for Business

JSKBS - Computer Applications for Business

Professional Development

15 Qs

Security Essentials - Encryptie herhaling

Security Essentials - Encryptie herhaling

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

Klaas Thys

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Welk begrip over encryptie is hier weggelaten?

2.

CATEGORIZE QUESTION

3 mins • 1 pt

Plaats de eigenschappen bij de juiste encryptie techniek.

Groups:

(a) Symmetrische encryptie

,

(b) Assymetrische encryptie

Langzamer

Veiliger

Cipher text even groot als plain text

Minder bandbreedte

Cipher text expansion

Shared key

Public private key

Sneller

Meer bandbreedte

Minder veilig

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Bob gaat een bestand versturen naar Alice. Welke sleutel wordt gebruikt om te encrypteren?

Bob's public key

Bob's private key

Alice's public key

Alice's private key

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Alice heeft een geëncrypteerd bestand ontvangen van Bob dat versleutel is met haar public key. Met welke key kan ze het bestand gaan decrypteren?

Alice's public key

Alice's private key

Bob's public key

Bob's private key

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Welk assymetrisch encryptie algoritme wordt gebruikt bij de VPN verbinding tussen onze Kali Linux machine en de Try Hack Me omgeving? (Open het openvpn bestand dat je vorige les downloadde van Try Hack Me)

RSA

ECC

Diffie Hellmann

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Welk symetrisch encryptie algoritme wordt gebruikt bij de VPN verbinding tussen onze Kali Linux machine en de try hack me omgeving? (Open het openvpn bestand dat je vorige les downloadde van Try Hack Me)

AES-128

AES-256

ECC-128

ECC-256

ECC-512

7.

MATCH QUESTION

1 min • 1 pt

Link de juiste type VPN verbinding bij de overeenkomstige afbeelding.

client-to-site VPN

Media Image

commercial VPN service

Media Image

site-to-site VPN

Media Image

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?