W10: CP05 Quiz (CSSD0223)

W10: CP05 Quiz (CSSD0223)

University

15 Qs

quiz-placeholder

Similar activities

The Internet

The Internet

University

20 Qs

ITBP301_Chapter 03-04

ITBP301_Chapter 03-04

University

10 Qs

Ceaser Cipher, Atbash Cipher, and Rot13 cipher

Ceaser Cipher, Atbash Cipher, and Rot13 cipher

12th Grade - University

15 Qs

BAB 11

BAB 11

University

20 Qs

Cybersecurity Essentials Chapter 2 Review

Cybersecurity Essentials Chapter 2 Review

9th Grade - University

20 Qs

ASK T3 2.1 Kriptografi dalam Keselamatan Data

ASK T3 2.1 Kriptografi dalam Keselamatan Data

University

15 Qs

Cryptography

Cryptography

University

15 Qs

cybercrypt

cybercrypt

University

10 Qs

W10: CP05 Quiz (CSSD0223)

W10: CP05 Quiz (CSSD0223)

Assessment

Quiz

Computers

University

Hard

Created by

Bryan Manalaotao

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the primary goal of cryptography?
Data breach
Data integrity
Data replication
Data redundancy

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which discipline of cryptology involves developing and using codes for private communication?
Cryptanalysis
Cryptosynthesis
Cryptography
Cryptobotany

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which type of cipher rearranges letters without replacing them?
Substitution cipher
Transposition cipher
Polyalphabetic cipher
Block cipher

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What method does a cryptanalyst use when having access to only the ciphertext of several messages?
Brute-force
Known-plaintext
Chosen-plaintext
Ciphertext

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the primary factor ensuring the security of encryption in modern technology?
Complexity of the algorithm
Length of the plaintext
Length of the key
Availability of the ciphertext

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What cryptographic function is used to verify and ensure data integrity?
Encryption
Decryption
Hashing
Encoding

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which property must a cryptographic hash function possess?
Collision-free
Reversible
Variable output length
Ease of computation for any input

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?