Information Security UK 5

Information Security UK 5

University

8 Qs

quiz-placeholder

Similar activities

Encryption

Encryption

University

12 Qs

Final Keamanan Komputer / Sistem Keamanan Jaringan

Final Keamanan Komputer / Sistem Keamanan Jaringan

University

11 Qs

Chapter 9

Chapter 9

University

9 Qs

Blockchain Basics: Algorithms

Blockchain Basics: Algorithms

University - Professional Development

9 Qs

Cryptography

Cryptography

University

10 Qs

TAC3121-Quiz 4

TAC3121-Quiz 4

University

10 Qs

Cybersecurity Fundamentals Week 4 Quiz

Cybersecurity Fundamentals Week 4 Quiz

KG - University

10 Qs

TAC3121-Quiz 6

TAC3121-Quiz 6

University

10 Qs

Information Security UK 5

Information Security UK 5

Assessment

Quiz

Computers

University

Hard

Created by

Udhayakumar Shanmugam

Used 1+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Public Key Encryption is also called as .......................

Asymmetric Key Encryption

Symmetric Key Encryption

Hash

Signature

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hash function is a function that takes an input (or 'message') and returns a.............................. string of bytes

Fixed Size

Variable size

64bytes

128bits

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An example for hash Function is.........

SHA

MD5

Both

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

.......................... was designed to provide all four aspects of security, i.e., privacy, integrity, authentication, and non-repudiation in the sending of email.

PGP

KGB

MIME

SHA

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

PGP stands for ............................

Pretty Good Protection

Pretty Good Privacy

Privacy Good Protection

Privacy Generated Publickey

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ................................is an electronic, encrypted, stamp of authentication on digital information such as email messages, macros, or electronic documents.

digital signature

Email

Hash value

Public key

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Digital Signature the Sender uses ................key

Private

Public

both

none

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In asymmetric encryption, also known as public key cryptography, the sender uses the ......................................... to encrypt data.

senders public key

recipient's private key

Recipient's public key

none