
Chapter 6 (Fundamentals of Cybersecurity
Authored by Kelly Gafford
Computers
University
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
Cryptography is the art of transforming information called (a) into an unreadable form (ciphertext) using a secret key
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which process involves transforming plaintext into ciphertext using a key
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which process involves transforming ciphertext into plaintext using a key
4.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
What term is used to verify the identity of an individual using digital signatures and public-key cryptography?
(a)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following uses an immutable ledger that facilitates the process of recording transactions?
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following are limitations to cryptography?
Key management can be complex
New vulnerabilities may emerge
Quantum computing threatens existing algorithms
Key length does not affect security.
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following are common cryptographic algorithms?
Ceasar Cipher
OTP
Hashing
LTP
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?