101 Lecture 5

101 Lecture 5

University

6 Qs

quiz-placeholder

Similar activities

Computer Science Password Hashing

Computer Science Password Hashing

University

10 Qs

ITBP301_Chapter 02

ITBP301_Chapter 02

University

10 Qs

iGCSE Cryptography (2023 onwards)

iGCSE Cryptography (2023 onwards)

9th Grade - University

10 Qs

OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing

OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing

11th Grade - University

9 Qs

ITBP301_Chapter 03-04

ITBP301_Chapter 03-04

University

10 Qs

Blockchain Quiz

Blockchain Quiz

University

10 Qs

CLI - Basic Security

CLI - Basic Security

University

10 Qs

Cybersecurity Fundamentals Week 5 Quiz

Cybersecurity Fundamentals Week 5 Quiz

KG - University

10 Qs

101 Lecture 5

101 Lecture 5

Assessment

Quiz

Computers

University

Medium

Created by

Vasaka Visoottiviseth

Used 1+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which concept is not included in CIA principles?h 

Accuracy

Integrity

Availability

Confidentiality

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Q.2: Using an ATM card to login to withdraw money from a machine is categorized as which authentication method?

What You Know

What You Have

What You Are

What You Own

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Q3: Which concept involves keeping track of user actions?

Authentication

Accounting

Auditing

Access Control

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Q4: Which type of Encryption that requires both the public key and the private key?

Symmetric Encryption

Asymmetric Encrytion

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Q5: In the Asymmetric Encryption, when Alice sends a secret message to Bob, Alice has to use which key to encrypt?

Bob's Public Key

Bob's Private Key

Alice's Public Key

Alice's Private Key

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Q6: In the Asymmetric Encryption, when Bob receives a secret message from Alice, he has to use which key to decrypt?

Bob's Public Key

Bob's Private Key

Alice's Public Key

Alice's Private Key