
Security quiz
Authored by Avula Anjaneyulu
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
6 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
what are the different Cryptographic methods we have ?
1.Encryption/Decryption
2.Authentication/Authorization
1.Only Decryption
2.Only Authorization
1.Encryption/Decryption
2.Authentication/Authorization
3.Hash method
4.Random number generator
Decryption
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the Crypto modules we have ?
1.Crypto driver
2.Crypto interface
3.DET
4.DEM
1.DET
2.DEM
3.PDUR
None
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the defined operation modes for Job processing
CRYPTO_OPERATIONMODE_START
CRYPTO_OPERATIONMODE_START
CRYPTO_OPERATIONMODE_UPDATE
CRYPTO_OPERATIONMODE_FINISH
CRYPTO_OPERATIONMODE_STREAMSTART
CRYPTO_OPERATIONMODE_SINGLECALL
CRYPTO_OPERATIONMODE_UPDATE
CRYPTO_OPERATIONMODE_FINISH
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the processing modes of primitives
Synchronous
Asynchronous
Both Synchronous and Asynchronous
none
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How the Job is configured?
Via the Crypto
Via the Cryif
Via the Csm
None
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
From the following options what are the different services supported Keymanagement in Crypto SW
1.Random seed
2.Key derivate
1.Signature generate
2.Signature verify
KeyExchange
All of the above
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?