CB3491 CRYPTOGRAPHY AND CYBER SECURITY

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

University

10 Qs

quiz-placeholder

Similar activities

Ceaser Cipher, Atbash Cipher, and Rot13 cipher

Ceaser Cipher, Atbash Cipher, and Rot13 cipher

12th Grade - University

15 Qs

LESSON 6 CRYPTOGRAPHY

LESSON 6 CRYPTOGRAPHY

University

14 Qs

Cryptography

Cryptography

University

15 Qs

cybercrypt

cybercrypt

University

10 Qs

8th module23

8th module23

University

13 Qs

Quiz 1

Quiz 1

University

11 Qs

ASK T3 2.1 Kriptografi dalam Keselamatan Data

ASK T3 2.1 Kriptografi dalam Keselamatan Data

University

15 Qs

Understanding Data Transformation Techniques

Understanding Data Transformation Techniques

12th Grade - University

10 Qs

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

Assessment

Quiz

Computers

University

Medium

Created by

Sabeetha S

Used 8+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of converting plain text into cipher text is _________________

decryption
encoding
hashing
encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Symmetric encryption is also known as _______________

public key encryption
asymmetric encryption
hash-based encryption
secret key encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Caesar cipher is a _________ cipher that has a key of 3.

transposition
block

additive

stream

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The ___________ cipher reorders the plain text characters to create a cipher text.

substitution
hashing
transposition
encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following stage of cryptography are the non readable encrypted data?

key
hash
plaintext
ciphertext

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of encryption uses the same key for both encryption and decryption?

Asymmetric encryption
Hashing
Base64 encoding
Symmetric encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a characteristic of a good encryption algorithm?

Confidentiality

Integrity

Availability

Authenticity

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?