Cyber Security Chapter-4 (A)

Cyber Security Chapter-4 (A)

Professional Development

23 Qs

quiz-placeholder

Similar activities

Communication Skills 2

Communication Skills 2

Professional Development

22 Qs

AI-102_Module-10&11

AI-102_Module-10&11

Professional Development

20 Qs

e-COM 2024/s0s5 MID TERM

e-COM 2024/s0s5 MID TERM

Professional Development

26 Qs

MTA: 98-367 Security Part 2

MTA: 98-367 Security Part 2

KG - Professional Development

20 Qs

digital signature standard algorithm

digital signature standard algorithm

Professional Development

20 Qs

java Exception handling

java Exception handling

Professional Development

26 Qs

Azure Quiz

Azure Quiz

Professional Development

18 Qs

Server day 13 final

Server day 13 final

Professional Development

21 Qs

Cyber Security Chapter-4 (A)

Cyber Security Chapter-4 (A)

Assessment

Quiz

Professional Development

Professional Development

Medium

Created by

Abhinav Asp

Used 4+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens your data whe it is encrypted?
It transferred to a third party,encoded sent back
It is recorded to retain privacy from third parties
It is compressed archieved and renamed.
none

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

By encryption of a text we mean
compress it
expand it
scrambling it to preserve its security
hashing it

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Certification of digital signature by an independant authority is needed because
the authority checks and assures customer
it is safe
it gives confidence to business
private key

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DES works by using
only permutation on 128 bits
permutation and sustitution on 64 bits blocks of plain text
4 rounds of sustitution
exclusive OR

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption can be done
only on textual data
only on ascii coded data
on any bit string
only on mnemonis data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

By symmetric key encryption we mean
only public keys are used for encryption
private and public keys are used for encryption
one private key used for both encryption and decryption
hashing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A digital signature is required to
prove that the message was sent by the sender
deliver proper message
prove validity
none

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?