Data Comm 4

Data Comm 4

University

20 Qs

quiz-placeholder

Similar activities

Ceaser Cipher, Atbash Cipher, and Rot13 cipher

Ceaser Cipher, Atbash Cipher, and Rot13 cipher

12th Grade - University

15 Qs

IT Participation 6

IT Participation 6

University

15 Qs

DCN5511: Chapter 5 - 7

DCN5511: Chapter 5 - 7

University

15 Qs

Transport Layer Security

Transport Layer Security

University

20 Qs

BSA - Elec - Finals

BSA - Elec - Finals

University

20 Qs

Netw2-Quiz No.2 (final term) II-BINS

Netw2-Quiz No.2 (final term) II-BINS

University

15 Qs

IAS QUIZ 9

IAS QUIZ 9

University

25 Qs

IAS CH5 QUIZ

IAS CH5 QUIZ

University

25 Qs

Data Comm 4

Data Comm 4

Assessment

Quiz

Computers

University

Easy

Created by

Jenny Ragay

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

45 sec • 5 pts

Media Image

Based on the image, IFMMP is the ____.

2.

FILL IN THE BLANK QUESTION

45 sec • 5 pts

Media Image

Based on the image, HELLO is the ____.

3.

FILL IN THE BLANK QUESTION

1 min • 10 pts

Media Image

If the encryption key is [letter + 1], what is the ciphertext if the plaintext is 'SECRET'?

4.

FILL IN THE BLANK QUESTION

1 min • 10 pts

If the decryption key is [letter - 1], what is the plaintext if the ciphertext is 'GJFTUB'?

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

It also known as a shared key or private key algorithm, uses the same key for encryption and decryption.

Symmetric encryption

Asymmetric encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Hashing is a two-way function that includes encryption and decryption.

TRUE

FALSE

7.

OPEN ENDED QUESTION

1 min • 5 pts

State one usage of encryption and decryption.

Evaluate responses using AI:

OFF

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?