Cyber Security Chapter-4 (A)

Cyber Security Chapter-4 (A)

Professional Development

23 Qs

quiz-placeholder

Similar activities

Data Protection - what do you know?

Data Protection - what do you know?

Professional Development

20 Qs

Health Insurance Quiz 9

Health Insurance Quiz 9

Professional Development

20 Qs

GW Fun Facts QUIZ #1

GW Fun Facts QUIZ #1

Professional Development

20 Qs

Collocation

Collocation

Professional Development

18 Qs

contract law 3-elements

contract law 3-elements

Professional Development

20 Qs

NOBELIS SMART Therapy Manager

NOBELIS SMART Therapy Manager

Professional Development

20 Qs

Module 3 unit 5 Using File System

Module 3 unit 5 Using File System

Professional Development

20 Qs

February Trivia

February Trivia

Professional Development

18 Qs

Cyber Security Chapter-4 (A)

Cyber Security Chapter-4 (A)

Assessment

Quiz

Professional Development

Professional Development

Practice Problem

Medium

Created by

Abhinav Asp

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens your data whe it is encrypted?

It transferred to a third party,encoded sent back
It is recorded to retain privacy from third parties
It is compressed archieved and renamed.
none

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

By encryption of a text we mean

compress it
expand it
scrambling it to preserve its security
hashing it

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Certification of digital signature by an independant authority is needed because

the authority checks and assures customer
it is safe
it gives confidence to business
private key

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DES works by using

only permutation on 128 bits
permutation and sustitution on 64 bits blocks of plain text
4 rounds of sustitution
exclusive OR

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption can be done

only on textual data
only on ascii coded data
on any bit string
only on mnemonis data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

By symmetric key encryption we mean

only public keys are used for encryption
private and public keys are used for encryption
one private key used for both encryption and decryption
hashing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A digital signature is required to

prove that the message was sent by the sender
deliver proper message
prove validity
none

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?