CYB125 - Ch7

CYB125 - Ch7

University

•

31 Qs

quiz-placeholder

Similar activities

Cryptography Methods Quiz

Cryptography Methods Quiz

8th Grade - University

•

30 Qs

Tech Quiz 2025-26

Tech Quiz 2025-26

9th Grade - University

•

30 Qs

Soal UTS KSTI - TF7

Soal UTS KSTI - TF7

University

•

31 Qs

KUIS UAS ALA ALA SIM (BAB 8-14)

KUIS UAS ALA ALA SIM (BAB 8-14)

University

•

35 Qs

Information and Communication Technology Skills

Information and Communication Technology Skills

9th Grade - University

•

32 Qs

Digital Asset Review

Digital Asset Review

10th Grade - University

•

26 Qs

Networking Quiz

Networking Quiz

University

•

26 Qs

Programming Fundamentals Quiz

Programming Fundamentals Quiz

University

•

28 Qs

CYB125 - Ch7

CYB125 - Ch7

Assessment

Quiz

•

Information Technology (IT)

•

University

•

Practice Problem

•

Hard

Created by

Anonymous Anonymous

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

31 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Maria receives a ciphertext message from her colleague Wen. What type of function does Maria need to use to read the plaintext message?

Encryption

Hashing

Decryption

Validation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which approach to cryptography uses highly parallel algorithms that could solve problems in a fraction of the time needed by conventional computers?

Quantum cryptography

Asymmetric cryptography

Elliptic curve cryptography

Classic cryptography

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bob is sending a message to Alice. He wants to ensure that nobody can read the content of the message while it is in transit. What goal of cryptography is Bob attempting to achieve?

Confidentiality

Integrity

Authentication

Nonrepudiation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bob is sending a message to Alice. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Bob attempting to achieve?

Confidentiality

Integrity

Authentication

Nonrepudiation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When Alice receives a message from Bob, she wants to be able to demonstrate to Miriam that the message actually came from Bob. What goal of cryptography is Alice attempting to achieve?

Confidentiality

Integrity

Authentication

Nonrepudiation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice would like to send a message to Bob securely and wishes to use asymmetric encryption to encrypt the contents of the message. What key does she use to encrypt this message?

Alice's public key

Alice's private key

Bob's public key

Bob's private key

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Security objectives add value to relationships between businesses or between businesses and their customers. Which objective binds a message or data to a specific entity?

Message authentication

Digital signature

Receipt and confirmation

Nonrepudiation

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?