Cryptography UK 1

Cryptography UK 1

University

10 Qs

quiz-placeholder

Similar activities

Chapter 9

Chapter 9

University

9 Qs

Final Keamanan Komputer / Sistem Keamanan Jaringan

Final Keamanan Komputer / Sistem Keamanan Jaringan

University

11 Qs

Ecommerce Security

Ecommerce Security

University

10 Qs

Tes Keamanan Jaringan

Tes Keamanan Jaringan

10th Grade - University

10 Qs

Chapter 8: Database Security

Chapter 8: Database Security

University

10 Qs

Information Security Principles

Information Security Principles

University

10 Qs

BAB 2 - ASK TINGKATAN 3

BAB 2 - ASK TINGKATAN 3

University

10 Qs

CIS7 Quiz 3 Review

CIS7 Quiz 3 Review

University

15 Qs

Cryptography UK 1

Cryptography UK 1

Assessment

Quiz

Computers

University

Medium

Created by

Udhayakumar Shanmugam

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

..............................................................Assures that private or confidential information is not made available or disclosed to unauthorized individuals.

Data Confidentiality

Data Integrity

System Integrity

Privacy

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The opposite of CIA Triad is

DAD Triad disclosure, alteration, and denial

DAD triad distraction, alteration, and denial

DAD triad disclosure, alteration, and destruction

DAD triad disclosure, Attack, and Denial

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Repudiation and masquerading is a threat to

Confidentiality

Integrity

Availability

Authenticity

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these attacks is related to Confidentiality?

Snooping

replaying

Denial of Service

Modification

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

............................................ is a concept that ensures that a person or entity cannot deny the authenticity of their digital actions.

Non-repudiation

Non Disclosure

Non Conformance

Non Availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

..................................... is the practice of concealing a file, message, image, or video within another file, message, image, or video

Steganography

Cryptography

Hiddenography

Geography

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

the process of Rearranging the elements in the plain text is known as ............................................

Substitution

Transposition

Product System

Transition

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?