Network Security Quiz

Network Security Quiz

University

10 Qs

quiz-placeholder

Similar activities

English Computer

English Computer

University

11 Qs

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

University

10 Qs

OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing

OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing

11th Grade - University

9 Qs

Quiz No. 3 II-CINS PNetSec (final term)

Quiz No. 3 II-CINS PNetSec (final term)

University

15 Qs

Cyber Security

Cyber Security

9th Grade - University

14 Qs

CNET151 Chapt 8 Encryption

CNET151 Chapt 8 Encryption

University

15 Qs

KCTF Quiz - 2

KCTF Quiz - 2

University

10 Qs

Quiz 1

Quiz 1

University

11 Qs

Network Security Quiz

Network Security Quiz

Assessment

Quiz

Computers

University

Hard

Created by

Neha Agarwal

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A person who enjoys learning details about computers and how to enhance their capabilities.

Cracker

Hacker

App controller

Site controller

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a Rail Fence cipher with 4 rails, if the plaintext is "CRYPTOGRAPHY," what is the ciphertext?

"CRAOPYRPTOHY"

"COYRHPTPARYG"

"CPOTRAGYPRHY"

"CRPOTPGRYAOYH"

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If you have a Caesar cipher ciphertext "WKLVLV DQG WKLVV" and suspect it was encrypted with a shift of 3, what is the decrypted message?

THREE TIMES THREE

SHIFTING AND SHIFT

HELLO WORLD HELLO

ENCRYPTED AND ENCRYPT

4.

OPEN ENDED QUESTION

3 mins • 1 pt

Define Steganography with example.

Evaluate responses using AI:

OFF

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cryptographic concept ensures that a message has not been altered in transit and also identifies the sender?

Confidentiality

Integrity

Availability

Non-repudiation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of encryption relies on the mathematical problem of factoring large composite numbers into their prime factors for security?

Symmetric-key encryption

Asymmetric-key encryption

Hashing

Steganography

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary advantage of the Running Key Transposition Cipher over traditional transposition ciphers?

It uses a stronger key

It is more resistant to frequency analysis

It is faster for encryption

It is simpler to implement

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?