Cloud Computing Quiz

Cloud Computing Quiz

12th Grade

40 Qs

quiz-placeholder

Similar activities

regular verbs french

regular verbs french

7th Grade - University

39 Qs

ಕ್ವಿಜ್ ಸರಣಿ 76 : ಸಿರಿ ಕನ್ನಡ ನುಡಿ ಬಳಗ

ಕ್ವಿಜ್ ಸರಣಿ 76 : ಸಿರಿ ಕನ್ನಡ ನುಡಿ ಬಳಗ

8th Grade - Professional Development

40 Qs

KOMPUTER AKUNTANSI

KOMPUTER AKUNTANSI

12th Grade

40 Qs

SOAL PRAKARYA limbah organik 7

SOAL PRAKARYA limbah organik 7

1st Grade - Professional Development

35 Qs

UJIAN SUMATIF AKHIR SEMESTER GAZAL (USAS) PKK KELAS 12 2025

UJIAN SUMATIF AKHIR SEMESTER GAZAL (USAS) PKK KELAS 12 2025

12th Grade - University

40 Qs

PENGANTAR EKONOMI

PENGANTAR EKONOMI

1st Grade - University

40 Qs

2024 Oshwal College ICT Competition

2024 Oshwal College ICT Competition

12th Grade

35 Qs

Administrasi Pajak

Administrasi Pajak

10th Grade - University

45 Qs

Cloud Computing Quiz

Cloud Computing Quiz

Assessment

Quiz

Other

12th Grade

Practice Problem

Medium

Created by

Ержан Сагындык

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Denial of service (DOS) security attacks are intended to compromise a system's _______.

Confidentiality

Availability

Ingerity

Authentificty

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements is true for malwares?

They are computer programs that can infect other programs

Many of them can propagate by attaching themselves to files and emails

They may not always do outright damage

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following techniques system administrators use to reduce the risk of password hacking?

Preventing users from using alphanumeric passwords

Enforcing a cap on the number of password retries at login before the account gets locked

Encouraging usage of easy to remember dictionary words as passwords

All of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements about basic encryption techniques NOT true?

The key used in Caesar cipher should be kept private between the sender and the receiver

The key used in Caesar cipher should be made publicly available to allow the receiver to decrypt the message

The keys used in one-time pads need to be kept private between the sender and the receiver

The keys used in one-time pads are a pre-selected sequence of random numbers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements about private key cryptography is true?

The same key is used by both the sender and the receiver to encrypt and decrypt a message

The sender uses one key to encrypt a message and the receiver uses another key to decrypt it.

The sender and the receiver do not have to agree upon a shared key in advance

All of the above

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following statements is true for public key cryptosystem?

A secret message should be encrypted using the public key of the sender and decrypted using the private key of the receiver

A secret message should be encrypted using the private key of the sender and decrypted using the public key of the receiver
барлык вариант дурыс

A secret message should be encrypted using the private key of the sender and decrypted using the public key of the receiver
базада баска варриант жок так что бари дурыс

A secret message should be encrypted using the public key of the receiver and decrypted using the private key of the receiver

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

In case of digital signatures, which of the following statements will be true? (Digital signatures are not meant to be secret messages, instead they are used to demonstrate that the message must have originated from a particular sender who signed it).

Бари бирдей , бари дурыс The message will need to be encrypted using the sender’s private key. Anyone can then use the sender’s public key to decrypt it, and thereby verify that it must have been encrypted (signed) by that particular sender.

The message will need to be encrypted using the sender’s private key. Anyone can then use the sender’s public key to decrypt it, and thereby verify that it must have been encrypted (signed) by that particular sender.

The message will need to be encrypted using the sender’s private key. Anyone can then use the sender’s public key to decrypt it, and thereby verify that it must have been encrypted (signed) by that particular sender.

The message will need to be encrypted using the sender’s private key. Anyone can then use the sender’s public key to decrypt it, and thereby verify that it must have been encrypted (signed) by that particular sender.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?