Search Header Logo

câu 1- 45

Authored by Phuong Do

Other

Professional Development

Used 1+ times

câu 1- 45
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1.     General objectives of information security

a.     All three options

b.     Availability

c.     Secrecy

d.     Integrity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2.     According to Kirchoff's law, the security of the code system depends on what factors

a.     Lock

b.     Combine the above answers

c.     Combine the above answers

d.     Cryptographd

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3.     System Safety Strategies

a.     The weakest connection point, the holisticness

b.     The weakest connection point, the holisticness

c.     Bottleneck

d.     Protection in depth

e.     All answers above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

4   Applications of cryptography include

a.     Data security, information authentication, digital signature confirmation, key distribution

a.     Encryption, information integrity, digital signature generation, lock agreement

a.     Data encryption, hash generation, digital signatures, key management

a.     Data security, information integrity authentication, digital signatures, and key management

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5.     Ways to increase the security of the specification in the code system are

a.     Clear text compression masks the relationship between the clear and the code, increasing the dependency between the code and the clear text

a.     Increased dependency between the code and the explicit text

a.     Clear Text Compression

a.     Concealing the relationship between the plaintext and the code

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

6.     Factors that do not affect the security of a cryptographic system

a.     Script length

b.     Secret of the lock

c.     Encryption and decryption algorithms

d.     Computational complexity of the code system

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7.     The schema of a cryptographic system with several components

a.     3 different episodes

b.     6 different episodes

c.     5 different episodes

d.     4 different episodes

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?