CB3491 CRYPTOGRAPHY AND CYBER SECURITY

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

University

10 Qs

quiz-placeholder

Similar activities

Basic Excel

Basic Excel

University

15 Qs

Q6 - Info Mgt

Q6 - Info Mgt

University

10 Qs

QUIZ 7 PBO

QUIZ 7 PBO

University

10 Qs

Quiz No. 2.2 Hash Tables

Quiz No. 2.2 Hash Tables

University

12 Qs

Industry 4.0 Unit 1

Industry 4.0 Unit 1

University

10 Qs

DIGITAL MARKETING

DIGITAL MARKETING

University

15 Qs

Scratch

Scratch

KG - Professional Development

10 Qs

CBD2234 Week 2

CBD2234 Week 2

12th Grade - University

9 Qs

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Sabeetha S

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of converting plain text into cipher text is _________________

decryption
encoding
hashing
encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Symmetric encryption is also known as _______________

public key encryption
asymmetric encryption
hash-based encryption
secret key encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Caesar cipher is a _________ cipher that has a key of 3.

transposition
block

additive

stream

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The ___________ cipher reorders the plain text characters to create a cipher text.

substitution
hashing
transposition
encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following stage of cryptography are the non readable encrypted data?

key
hash
plaintext
ciphertext

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of encryption uses the same key for both encryption and decryption?

Asymmetric encryption
Hashing
Base64 encoding
Symmetric encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a characteristic of a good encryption algorithm?

Confidentiality

Integrity

Availability

Authenticity

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?