Cryptography UK 1

Cryptography UK 1

University

10 Qs

quiz-placeholder

Similar activities

Crytopgraphy

Crytopgraphy

9th Grade - Professional Development

10 Qs

Cyber Security

Cyber Security

9th Grade - University

14 Qs

UTS Kriptografi

UTS Kriptografi

University

10 Qs

KCTF Quiz - 2

KCTF Quiz - 2

University

10 Qs

Cybersecurity Fundamentals Quiz

Cybersecurity Fundamentals Quiz

10th Grade - University

15 Qs

Information Security Lab Quiz # 2

Information Security Lab Quiz # 2

University

15 Qs

THM Indore

THM Indore

University

12 Qs

Quiz No. 3 II-CINS PNetSec (final term)

Quiz No. 3 II-CINS PNetSec (final term)

University

15 Qs

Cryptography UK 1

Cryptography UK 1

Assessment

Quiz

Computers

University

Medium

Created by

Udhayakumar Shanmugam

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

..............................................................Assures that private or confidential information is not made available or disclosed to unauthorized individuals.

Data Confidentiality

Data Integrity

System Integrity

Privacy

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The opposite of CIA Triad is

DAD Triad disclosure, alteration, and denial

DAD triad distraction, alteration, and denial

DAD triad disclosure, alteration, and destruction

DAD triad disclosure, Attack, and Denial

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Repudiation and masquerading is a threat to

Confidentiality

Integrity

Availability

Authenticity

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these attacks is related to Confidentiality?

Snooping

replaying

Denial of Service

Modification

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

............................................ is a concept that ensures that a person or entity cannot deny the authenticity of their digital actions.

Non-repudiation

Non Disclosure

Non Conformance

Non Availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

..................................... is the practice of concealing a file, message, image, or video within another file, message, image, or video

Steganography

Cryptography

Hiddenography

Geography

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

the process of Rearranging the elements in the plain text is known as ............................................

Substitution

Transposition

Product System

Transition

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?