
Cloud Computing Quiz
Quiz
•
Other
•
12th Grade
•
Practice Problem
•
Medium
Ержан Сагындык
Used 2+ times
FREE Resource
Enhance your content in a minute
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Denial of service (DOS) security attacks are intended to compromise a system's _______.
Confidentiality
Availability
Ingerity
Authentificty
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following statements is true for malwares?
They are computer programs that can infect other programs
Many of them can propagate by attaching themselves to files and emails
They may not always do outright damage
All of the above
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following techniques system administrators use to reduce the risk of password hacking?
Preventing users from using alphanumeric passwords
Enforcing a cap on the number of password retries at login before the account gets locked
Encouraging usage of easy to remember dictionary words as passwords
All of the above
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following statements about basic encryption techniques NOT true?
The key used in Caesar cipher should be kept private between the sender and the receiver
The key used in Caesar cipher should be made publicly available to allow the receiver to decrypt the message
The keys used in one-time pads need to be kept private between the sender and the receiver
The keys used in one-time pads are a pre-selected sequence of random numbers
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following statements about private key cryptography is true?
The same key is used by both the sender and the receiver to encrypt and decrypt a message
The sender uses one key to encrypt a message and the receiver uses another key to decrypt it.
The sender and the receiver do not have to agree upon a shared key in advance
All of the above
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following statements is true for public key cryptosystem?
A secret message should be encrypted using the public key of the sender and decrypted using the private key of the receiver
A secret message should be encrypted using the private key of the sender and decrypted using the public key of the receiver
барлык вариант дурыс
A secret message should be encrypted using the private key of the sender and decrypted using the public key of the receiver
базада баска варриант жок так что бари дурыс
A secret message should be encrypted using the public key of the receiver and decrypted using the private key of the receiver
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
In case of digital signatures, which of the following statements will be true? (Digital signatures are not meant to be secret messages, instead they are used to demonstrate that the message must have originated from a particular sender who signed it).
Бари бирдей , бари дурыс The message will need to be encrypted using the sender’s private key. Anyone can then use the sender’s public key to decrypt it, and thereby verify that it must have been encrypted (signed) by that particular sender.
The message will need to be encrypted using the sender’s private key. Anyone can then use the sender’s public key to decrypt it, and thereby verify that it must have been encrypted (signed) by that particular sender.
The message will need to be encrypted using the sender’s private key. Anyone can then use the sender’s public key to decrypt it, and thereby verify that it must have been encrypted (signed) by that particular sender.
The message will need to be encrypted using the sender’s private key. Anyone can then use the sender’s public key to decrypt it, and thereby verify that it must have been encrypted (signed) by that particular sender.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
35 questions
Ag 10- Food Science
Quiz
•
9th - 12th Grade
45 questions
Piano Basics
Quiz
•
KG - University
40 questions
Economics: Chapters 4 & 5 Review
Quiz
•
KG - University
41 questions
Herhaling Nederlands 1A (Kerstmis)
Quiz
•
1st - 12th Grade
45 questions
Core Module 3
Quiz
•
10th - 12th Grade
40 questions
PEP (Revision)
Quiz
•
12th Grade - University
45 questions
ESS IA INVESTIGATION
Quiz
•
11th - 12th Grade
45 questions
US Bahasa Indonesia
Quiz
•
12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
Discover more resources for Other
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
12 questions
Add and Subtract Polynomials
Quiz
•
9th - 12th Grade
13 questions
Model Exponential Growth and Decay Scenarios
Quiz
•
9th - 12th Grade
27 questions
7.2.3 Quadrilateral Properties
Quiz
•
9th - 12th Grade
7 questions
Amoeba Sisters Dihybrid Cross Punnett Square
Interactive video
•
9th - 12th Grade
10 questions
The Holocaust: Historical Overview
Interactive video
•
9th - 12th Grade
10 questions
Key Features of Quadratic Functions
Interactive video
•
8th - 12th Grade
11 questions
Exponent Quotient Rules A1 U7
Quiz
•
9th - 12th Grade
