CYB125 - Ch7

CYB125 - Ch7

University

31 Qs

quiz-placeholder

Similar activities

Python Round 2

Python Round 2

University

30 Qs

The Cloud

The Cloud

University

26 Qs

Chương 3 - Ứng dụng phân tán

Chương 3 - Ứng dụng phân tán

University

27 Qs

Security Engineer Intern

Security Engineer Intern

University

28 Qs

Kuis 01_Big Data

Kuis 01_Big Data

University

31 Qs

Kuis 02_Sistem Operasi Bab 3-4

Kuis 02_Sistem Operasi Bab 3-4

University

30 Qs

Malware Threats

Malware Threats

12th Grade - University

32 Qs

CYB125 - Ch7

CYB125 - Ch7

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Hard

Created by

Anonymous Anonymous

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

31 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Maria receives a ciphertext message from her colleague Wen. What type of function does Maria need to use to read the plaintext message?

Encryption

Hashing

Decryption

Validation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which approach to cryptography uses highly parallel algorithms that could solve problems in a fraction of the time needed by conventional computers?

Quantum cryptography

Asymmetric cryptography

Elliptic curve cryptography

Classic cryptography

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bob is sending a message to Alice. He wants to ensure that nobody can read the content of the message while it is in transit. What goal of cryptography is Bob attempting to achieve?

Confidentiality

Integrity

Authentication

Nonrepudiation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bob is sending a message to Alice. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Bob attempting to achieve?

Confidentiality

Integrity

Authentication

Nonrepudiation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When Alice receives a message from Bob, she wants to be able to demonstrate to Miriam that the message actually came from Bob. What goal of cryptography is Alice attempting to achieve?

Confidentiality

Integrity

Authentication

Nonrepudiation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice would like to send a message to Bob securely and wishes to use asymmetric encryption to encrypt the contents of the message. What key does she use to encrypt this message?

Alice's public key

Alice's private key

Bob's public key

Bob's private key

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Security objectives add value to relationships between businesses or between businesses and their customers. Which objective binds a message or data to a specific entity?

Message authentication

Digital signature

Receipt and confirmation

Nonrepudiation

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?