Cloud Computing Quiz

Cloud Computing Quiz

12th Grade

40 Qs

quiz-placeholder

Similar activities

Professional Communication

Professional Communication

11th - 12th Grade

40 Qs

Quiz in MIL 2023

Quiz in MIL 2023

12th Grade

35 Qs

Technological Advances in the Financial Services Industry

Technological Advances in the Financial Services Industry

12th Grade

37 Qs

Unit 3 Assessment

Unit 3 Assessment

9th Grade - University

36 Qs

AS 200 & LE200 Final Test Review

AS 200 & LE200 Final Test Review

9th - 12th Grade

45 Qs

Big Data Dilemma, Apps, Facial Recog, Comm. unit

Big Data Dilemma, Apps, Facial Recog, Comm. unit

12th Grade

40 Qs

Intro Review

Intro Review

9th - 12th Grade

44 Qs

2024 Oshwal College ICT Competition

2024 Oshwal College ICT Competition

12th Grade

35 Qs

Cloud Computing Quiz

Cloud Computing Quiz

Assessment

Quiz

Other

12th Grade

Medium

Created by

Ержан Сагындык

Used 2+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Denial of service (DOS) security attacks are intended to compromise a system's _______.

Confidentiality

Availability

Ingerity

Authentificty

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements is true for malwares?

They are computer programs that can infect other programs

Many of them can propagate by attaching themselves to files and emails

They may not always do outright damage

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following techniques system administrators use to reduce the risk of password hacking?

Preventing users from using alphanumeric passwords

Enforcing a cap on the number of password retries at login before the account gets locked

Encouraging usage of easy to remember dictionary words as passwords

All of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements about basic encryption techniques NOT true?

The key used in Caesar cipher should be kept private between the sender and the receiver

The key used in Caesar cipher should be made publicly available to allow the receiver to decrypt the message

The keys used in one-time pads need to be kept private between the sender and the receiver

The keys used in one-time pads are a pre-selected sequence of random numbers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements about private key cryptography is true?

The same key is used by both the sender and the receiver to encrypt and decrypt a message

The sender uses one key to encrypt a message and the receiver uses another key to decrypt it.

The sender and the receiver do not have to agree upon a shared key in advance

All of the above

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following statements is true for public key cryptosystem?

A secret message should be encrypted using the public key of the sender and decrypted using the private key of the receiver

A secret message should be encrypted using the private key of the sender and decrypted using the public key of the receiver
барлык вариант дурыс

A secret message should be encrypted using the private key of the sender and decrypted using the public key of the receiver
базада баска варриант жок так что бари дурыс

A secret message should be encrypted using the public key of the receiver and decrypted using the private key of the receiver

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

In case of digital signatures, which of the following statements will be true? (Digital signatures are not meant to be secret messages, instead they are used to demonstrate that the message must have originated from a particular sender who signed it).

Бари бирдей , бари дурыс The message will need to be encrypted using the sender’s private key. Anyone can then use the sender’s public key to decrypt it, and thereby verify that it must have been encrypted (signed) by that particular sender.

The message will need to be encrypted using the sender’s private key. Anyone can then use the sender’s public key to decrypt it, and thereby verify that it must have been encrypted (signed) by that particular sender.

The message will need to be encrypted using the sender’s private key. Anyone can then use the sender’s public key to decrypt it, and thereby verify that it must have been encrypted (signed) by that particular sender.

The message will need to be encrypted using the sender’s private key. Anyone can then use the sender’s public key to decrypt it, and thereby verify that it must have been encrypted (signed) by that particular sender.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?