Cryptography UK 1

Cryptography UK 1

University

10 Qs

quiz-placeholder

Similar activities

Social Media

Social Media

University - Professional Development

10 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

10 Qs

Windows Updates

Windows Updates

9th Grade - Professional Development

8 Qs

Module 9-Address Resolution Protocol

Module 9-Address Resolution Protocol

9th Grade - Professional Development

10 Qs

Cryptography

Cryptography

6th Grade - University

15 Qs

Kriptografi

Kriptografi

University

10 Qs

Security+

Security+

University

15 Qs

Cybersecurity 1

Cybersecurity 1

5th Grade - University

12 Qs

Cryptography UK 1

Cryptography UK 1

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Udhayakumar Shanmugam

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

..............................................................Assures that private or confidential information is not made available or disclosed to unauthorized individuals.

Data Confidentiality

Data Integrity

System Integrity

Privacy

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The opposite of CIA Triad is

DAD Triad disclosure, alteration, and denial

DAD triad distraction, alteration, and denial

DAD triad disclosure, alteration, and destruction

DAD triad disclosure, Attack, and Denial

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Repudiation and masquerading is a threat to

Confidentiality

Integrity

Availability

Authenticity

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these attacks is related to Confidentiality?

Snooping

replaying

Denial of Service

Modification

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

............................................ is a concept that ensures that a person or entity cannot deny the authenticity of their digital actions.

Non-repudiation

Non Disclosure

Non Conformance

Non Availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

..................................... is the practice of concealing a file, message, image, or video within another file, message, image, or video

Steganography

Cryptography

Hiddenography

Geography

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

the process of Rearranging the elements in the plain text is known as ............................................

Substitution

Transposition

Product System

Transition

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?