101 Lecture 5

101 Lecture 5

University

6 Qs

quiz-placeholder

Similar activities

Asymmetric encryption

Asymmetric encryption

12th Grade - University

10 Qs

Chapter 6 (Fundamentals of Cybersecurity

Chapter 6 (Fundamentals of Cybersecurity

University

10 Qs

ITBP301_Chapter 04

ITBP301_Chapter 04

University

10 Qs

Computer Security:Encryption

Computer Security:Encryption

10th Grade - University

10 Qs

Chapter 9

Chapter 9

University

9 Qs

Ecommerce Security

Ecommerce Security

University

10 Qs

Quiz 1

Quiz 1

University

11 Qs

Croteau SY110 L18&19 AY25

Croteau SY110 L18&19 AY25

University

6 Qs

101 Lecture 5

101 Lecture 5

Assessment

Quiz

Computers

University

Medium

Created by

Vasaka Visoottiviseth

Used 1+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which concept is not included in CIA principles?h 

Accuracy

Integrity

Availability

Confidentiality

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Q.2: Using an ATM card to login to withdraw money from a machine is categorized as which authentication method?

What You Know

What You Have

What You Are

What You Own

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Q3: Which concept involves keeping track of user actions?

Authentication

Accounting

Auditing

Access Control

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Q4: Which type of Encryption that requires both the public key and the private key?

Symmetric Encryption

Asymmetric Encrytion

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Q5: In the Asymmetric Encryption, when Alice sends a secret message to Bob, Alice has to use which key to encrypt?

Bob's Public Key

Bob's Private Key

Alice's Public Key

Alice's Private Key

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Q6: In the Asymmetric Encryption, when Bob receives a secret message from Alice, he has to use which key to decrypt?

Bob's Public Key

Bob's Private Key

Alice's Public Key

Alice's Private Key