CB3491 CRYPTOGRAPHY AND CYBER SECURITY

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

University

10 Qs

quiz-placeholder

Similar activities

English Computer

English Computer

University

11 Qs

Key Exchange - CompTIA Security+ SY0-701 - 1.4

Key Exchange - CompTIA Security+ SY0-701 - 1.4

12th Grade - University

15 Qs

Chap 3 Net Security part2

Chap 3 Net Security part2

University

5 Qs

OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing

OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing

11th Grade - University

9 Qs

CNET151 Chapt 8 Encryption

CNET151 Chapt 8 Encryption

University

15 Qs

iGCSE Cryptography (2023 onwards)

iGCSE Cryptography (2023 onwards)

9th Grade - University

10 Qs

ASAS SAINS KOMPUTER T3

ASAS SAINS KOMPUTER T3

12th Grade - University

15 Qs

Malware Obfuscation

Malware Obfuscation

University

10 Qs

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

Assessment

Quiz

Computers

University

Hard

Created by

Sabeetha S

Used 9+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of converting plain text into cipher text is _________________

decryption
encoding
hashing
encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Symmetric encryption is also known as _______________

public key encryption
asymmetric encryption
hash-based encryption
secret key encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Caesar cipher is a _________ cipher that has a key of 3.

transposition
block

additive

stream

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The ___________ cipher reorders the plain text characters to create a cipher text.

substitution
hashing
transposition
encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following stage of cryptography are the non readable encrypted data?

key
hash
plaintext
ciphertext

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of encryption uses the same key for both encryption and decryption?

Asymmetric encryption
Hashing
Base64 encoding
Symmetric encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a characteristic of a good encryption algorithm?

Confidentiality

Integrity

Availability

Authenticity

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?