câu 1- 45

câu 1- 45

Professional Development

45 Qs

quiz-placeholder

Similar activities

Certified Information Systems Security Professional (CISSP)

Certified Information Systems Security Professional (CISSP)

Professional Development

40 Qs

BM M-03 FLASHCARDS FH - LOCK & LATCHES 02

BM M-03 FLASHCARDS FH - LOCK & LATCHES 02

Professional Development

50 Qs

Competency Unit 2 - Revision Question

Competency Unit 2 - Revision Question

Professional Development

46 Qs

ESTHETICS, Ch. 2 - A&P, Tissues & Systems

ESTHETICS, Ch. 2 - A&P, Tissues & Systems

Professional Development

50 Qs

MED ABBER 2

MED ABBER 2

Professional Development

49 Qs

cryptography and network security

cryptography and network security

Professional Development

45 Qs

Cryptography Quiz

Cryptography Quiz

Professional Development

44 Qs

Placement Oriented DevOps week - 2 Test ( Docker )

Placement Oriented DevOps week - 2 Test ( Docker )

Professional Development

40 Qs

câu 1- 45

câu 1- 45

Assessment

Quiz

Other

Professional Development

Easy

Created by

Phuong Do

Used 1+ times

FREE Resource

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1.     General objectives of information security

a.     All three options

b.     Availability

c.     Secrecy

d.     Integrity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2.     According to Kirchoff's law, the security of the code system depends on what factors

a.     Lock

b.     Combine the above answers

c.     Combine the above answers

d.     Cryptographd

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3.     System Safety Strategies

a.     The weakest connection point, the holisticness

b.     The weakest connection point, the holisticness

c.     Bottleneck

d.     Protection in depth

e.     All answers above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

4   Applications of cryptography include

a.     Data security, information authentication, digital signature confirmation, key distribution

a.     Encryption, information integrity, digital signature generation, lock agreement

a.     Data encryption, hash generation, digital signatures, key management

a.     Data security, information integrity authentication, digital signatures, and key management

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5.     Ways to increase the security of the specification in the code system are

a.     Clear text compression masks the relationship between the clear and the code, increasing the dependency between the code and the clear text

a.     Increased dependency between the code and the explicit text

a.     Clear Text Compression

a.     Concealing the relationship between the plaintext and the code

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

6.     Factors that do not affect the security of a cryptographic system

a.     Script length

b.     Secret of the lock

c.     Encryption and decryption algorithms

d.     Computational complexity of the code system

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7.     The schema of a cryptographic system with several components

a.     3 different episodes

b.     6 different episodes

c.     5 different episodes

d.     4 different episodes

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?