Information Security UK 5

Information Security UK 5

University

8 Qs

quiz-placeholder

Similar activities

AIJ (Memahami Fairewall)

AIJ (Memahami Fairewall)

University

10 Qs

Webinar Quiz

Webinar Quiz

University

13 Qs

Implementing Mass Storage Application

Implementing Mass Storage Application

10th Grade - University

10 Qs

Sorting and Selection DSA Quiz

Sorting and Selection DSA Quiz

University

12 Qs

Kontainerisasi dan DevOps

Kontainerisasi dan DevOps

University

10 Qs

Databases Week 2 Review

Databases Week 2 Review

12th Grade - Professional Development

12 Qs

CHAPTER 1: COMPUTER SECURITY REVIEW

CHAPTER 1: COMPUTER SECURITY REVIEW

University

10 Qs

Quiz Webinar GNS3

Quiz Webinar GNS3

10th Grade - University

13 Qs

Information Security UK 5

Information Security UK 5

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Udhayakumar Shanmugam

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Public Key Encryption is also called as .......................

Asymmetric Key Encryption

Symmetric Key Encryption

Hash

Signature

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hash function is a function that takes an input (or 'message') and returns a.............................. string of bytes

Fixed Size

Variable size

64bytes

128bits

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An example for hash Function is.........

SHA

MD5

Both

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

.......................... was designed to provide all four aspects of security, i.e., privacy, integrity, authentication, and non-repudiation in the sending of email.

PGP

KGB

MIME

SHA

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

PGP stands for ............................

Pretty Good Protection

Pretty Good Privacy

Privacy Good Protection

Privacy Generated Publickey

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ................................is an electronic, encrypted, stamp of authentication on digital information such as email messages, macros, or electronic documents.

digital signature

Email

Hash value

Public key

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Digital Signature the Sender uses ................key

Private

Public

both

none

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?