INS Class Activity -1

INS Class Activity -1

University

35 Qs

quiz-placeholder

Similar activities

2.3.3 - Code of Ethics for Engineers

2.3.3 - Code of Ethics for Engineers

10th Grade - University

35 Qs

Cybersecurity Quizz round 2

Cybersecurity Quizz round 2

University

30 Qs

MCQs on Advertising and Media Planning

MCQs on Advertising and Media Planning

University

30 Qs

ввп,

ввп,

University

35 Qs

Pretest Pemrograman Komputer TIL

Pretest Pemrograman Komputer TIL

University

35 Qs

Introduction to Data & Communication Network

Introduction to Data & Communication Network

University

30 Qs

React

React

University

30 Qs

Introduction to Mechanical Engineering Quiz

Introduction to Mechanical Engineering Quiz

University

30 Qs

INS Class Activity -1

INS Class Activity -1

Assessment

Quiz

Engineering

University

Hard

Created by

Prof. Trivedi

FREE Resource

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who was the first known user of the Caesar Cipher?

Caesar Romanus

Julius Caesar

Alan Turing

There isn't one

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In Cryptography, original message, before being transformed, is called

Simple Text

Plain Text

Cipher Text

Filled Text

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An encryption algorithm transforms plain text into:

Cipher text

Simple Text

Empty Text

Plain Text

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

_______ is the science and art of transforming messages to make them secure and immune to attacks.

Cryptography

Cryptoanalysis

neither Cryptography nor Cryptoanalysis

either Cryptography or Cryptoanalysis

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A(n) ______ algorithm transforms cipher text to plain text.

Encryption

Decryption

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The art and science of breaking the cipher text is known as

Cryptanalysis

Cryptography

Staganography

Watermarking

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A method for determining a solution to a problem by sequentially testing all possible solutions.

brute force

relative frequency

cipher

paired keys

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?