Denial of service (DOS) security attacks are intended to compromise a system's _______.

Cloud Computing Quiz

Quiz
•
Other
•
12th Grade
•
Medium
Ержан Сагындык
Used 2+ times
FREE Resource
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Confidentiality
Availability
Ingerity
Authentificty
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following statements is true for malwares?
They are computer programs that can infect other programs
Many of them can propagate by attaching themselves to files and emails
They may not always do outright damage
All of the above
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following techniques system administrators use to reduce the risk of password hacking?
Preventing users from using alphanumeric passwords
Enforcing a cap on the number of password retries at login before the account gets locked
Encouraging usage of easy to remember dictionary words as passwords
All of the above
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following statements about basic encryption techniques NOT true?
The key used in Caesar cipher should be kept private between the sender and the receiver
The key used in Caesar cipher should be made publicly available to allow the receiver to decrypt the message
The keys used in one-time pads need to be kept private between the sender and the receiver
The keys used in one-time pads are a pre-selected sequence of random numbers
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following statements about private key cryptography is true?
The same key is used by both the sender and the receiver to encrypt and decrypt a message
The sender uses one key to encrypt a message and the receiver uses another key to decrypt it.
The sender and the receiver do not have to agree upon a shared key in advance
All of the above
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following statements is true for public key cryptosystem?
A secret message should be encrypted using the public key of the sender and decrypted using the private key of the receiver
A secret message should be encrypted using the private key of the sender and decrypted using the public key of the receiver
барлык вариант дурыс
A secret message should be encrypted using the private key of the sender and decrypted using the public key of the receiver
базада баска варриант жок так что бари дурыс
A secret message should be encrypted using the public key of the receiver and decrypted using the private key of the receiver
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
In case of digital signatures, which of the following statements will be true? (Digital signatures are not meant to be secret messages, instead they are used to demonstrate that the message must have originated from a particular sender who signed it).
Бари бирдей , бари дурыс The message will need to be encrypted using the sender’s private key. Anyone can then use the sender’s public key to decrypt it, and thereby verify that it must have been encrypted (signed) by that particular sender.
The message will need to be encrypted using the sender’s private key. Anyone can then use the sender’s public key to decrypt it, and thereby verify that it must have been encrypted (signed) by that particular sender.
The message will need to be encrypted using the sender’s private key. Anyone can then use the sender’s public key to decrypt it, and thereby verify that it must have been encrypted (signed) by that particular sender.
The message will need to be encrypted using the sender’s private key. Anyone can then use the sender’s public key to decrypt it, and thereby verify that it must have been encrypted (signed) by that particular sender.
Create a free account and access millions of resources
Similar Resources on Quizizz
40 questions
Missouri EOC - American Government

Quiz
•
9th - 12th Grade
36 questions
evaluating sources

Quiz
•
5th Grade - University
39 questions
Excel Module 2 Quiz 2

Quiz
•
9th - 12th Grade
37 questions
EAPP

Quiz
•
12th Grade
40 questions
Criminology Unit 4 3.1 The Role of Agencies in Social Control

Quiz
•
12th Grade
41 questions
UNIT 202: COMMUNICATION IN INDUSTRY

Quiz
•
12th Grade
45 questions
WJEC Hospitality and Catering 1.1.4 Customer Needs and Wants

Quiz
•
9th - 12th Grade
40 questions
Objective 6.0- Sustainable Agroforestry Study Guide

Quiz
•
9th - 12th Grade
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Other
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University