Information Security UK 5

Information Security UK 5

University

8 Qs

quiz-placeholder

Similar activities

Security

Security

12th Grade - University

12 Qs

E mail Security

E mail Security

University

10 Qs

Security IPSec

Security IPSec

University

10 Qs

DES- Encryption

DES- Encryption

University

8 Qs

Blockchain

Blockchain

5th Grade - Professional Development

10 Qs

Unit 10 - Internet Security

Unit 10 - Internet Security

12th Grade - University

13 Qs

Blockchain Quiz

Blockchain Quiz

University

10 Qs

ITBP301_Chapter 03-04

ITBP301_Chapter 03-04

University

10 Qs

Information Security UK 5

Information Security UK 5

Assessment

Quiz

Computers

University

Hard

Created by

Udhayakumar Shanmugam

Used 1+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Public Key Encryption is also called as .......................

Asymmetric Key Encryption

Symmetric Key Encryption

Hash

Signature

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hash function is a function that takes an input (or 'message') and returns a.............................. string of bytes

Fixed Size

Variable size

64bytes

128bits

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An example for hash Function is.........

SHA

MD5

Both

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

.......................... was designed to provide all four aspects of security, i.e., privacy, integrity, authentication, and non-repudiation in the sending of email.

PGP

KGB

MIME

SHA

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

PGP stands for ............................

Pretty Good Protection

Pretty Good Privacy

Privacy Good Protection

Privacy Generated Publickey

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ................................is an electronic, encrypted, stamp of authentication on digital information such as email messages, macros, or electronic documents.

digital signature

Email

Hash value

Public key

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Digital Signature the Sender uses ................key

Private

Public

both

none

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In asymmetric encryption, also known as public key cryptography, the sender uses the ......................................... to encrypt data.

senders public key

recipient's private key

Recipient's public key

none