Cryptography and Computer Security Quiz 4

Cryptography and Computer Security Quiz 4

University

15 Qs

quiz-placeholder

Similar activities

Threats, Issues, and Defenses - Ch 5

Threats, Issues, and Defenses - Ch 5

10th Grade - University

20 Qs

IT Participation 6

IT Participation 6

University

15 Qs

Understanding Data Transformation Techniques

Understanding Data Transformation Techniques

12th Grade - University

10 Qs

Ceaser Cipher, Atbash Cipher, and Rot13 cipher

Ceaser Cipher, Atbash Cipher, and Rot13 cipher

12th Grade - University

15 Qs

Principles of IT Vocabulary A-J

Principles of IT Vocabulary A-J

7th Grade - University

10 Qs

BSA - Elec - Finals

BSA - Elec - Finals

University

20 Qs

ITBP301_Chapter 02

ITBP301_Chapter 02

University

10 Qs

015_Key Exchange - CompTIA Security+ SY0-701 - 1.4

015_Key Exchange - CompTIA Security+ SY0-701 - 1.4

9th Grade - University

13 Qs

Cryptography and Computer Security Quiz 4

Cryptography and Computer Security Quiz 4

Assessment

Quiz

Computers

University

Hard

Created by

dyfhnc6jdd apple_user

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the study of encrypting/hiding data called?

Cryptology

Cryptography

Algorithm

Cryptanalysis

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the reverse of encryption?

Algorithm

Cipher

Decryption

Cryptography

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the output of encrypted plaintext data called?

Ciphertext

Algorithm

Plaintext

Key

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of cryptography in computer security?

Ensuring data integrity

Providing authentication

All of the above

Achieving confidentiality

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the two types of operations used for encrypting information?

Substitution and Transposition

Sorting and Filtering

Addition and Multiplication

Encoding and Decoding

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the universal technique for providing confidentiality for transmitted or stored data?

Symmetric encryption

Asymmetric encryption

Public-key encryption

Stream cipher

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the 5 ingredients in symmetric encryption?

Plaintext, Encryption algorithm, Public key, Ciphertext, Decryption algorithm

Plaintext, Encryption algorithm, Secret key, Ciphertext, Decryption algorithm

Ciphertext, Secret key, Public key, Decryption algorithm, Encryption algorithm

Plaintext, Secret key, Public key, Ciphertext, Decryption algorithm

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?