Cyber Security Chapter-4 (A)

Cyber Security Chapter-4 (A)

Professional Development

23 Qs

quiz-placeholder

Similar activities

VIVO V17 ASSESSMENT

VIVO V17 ASSESSMENT

Professional Development

19 Qs

HKMNOP C3

HKMNOP C3

University - Professional Development

20 Qs

Blood relations 20th May

Blood relations 20th May

Professional Development

20 Qs

Assertiveness

Assertiveness

Professional Development

20 Qs

Business and Professional Excellence

Business and Professional Excellence

Professional Development

20 Qs

OBE Quiz

OBE Quiz

Professional Development

21 Qs

Customer Relations Day 6

Customer Relations Day 6

Professional Development

18 Qs

Business English 1

Business English 1

Professional Development

20 Qs

Cyber Security Chapter-4 (A)

Cyber Security Chapter-4 (A)

Assessment

Quiz

Professional Development

Professional Development

Practice Problem

Medium

Created by

Abhinav Asp

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens your data whe it is encrypted?

It transferred to a third party,encoded sent back
It is recorded to retain privacy from third parties
It is compressed archieved and renamed.
none

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

By encryption of a text we mean

compress it
expand it
scrambling it to preserve its security
hashing it

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Certification of digital signature by an independant authority is needed because

the authority checks and assures customer
it is safe
it gives confidence to business
private key

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DES works by using

only permutation on 128 bits
permutation and sustitution on 64 bits blocks of plain text
4 rounds of sustitution
exclusive OR

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption can be done

only on textual data
only on ascii coded data
on any bit string
only on mnemonis data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

By symmetric key encryption we mean

only public keys are used for encryption
private and public keys are used for encryption
one private key used for both encryption and decryption
hashing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A digital signature is required to

prove that the message was sent by the sender
deliver proper message
prove validity
none

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?