
Croteau SY110 L18&19 AY25
Authored by Brien Croteau
Computers
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
6 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 3 pts
What word is used to define a method to transform a message to conceal its meaning?
cipher
plaintext
ciphertext
key
2.
MULTIPLE CHOICE QUESTION
10 sec • 3 pts
What is the biggest challenge when deploying symmetric encryption?
length of ciphertext
key distribution
encryption algorithm
decryption speed
3.
MULTIPLE CHOICE QUESTION
20 sec • 3 pts
Which of the following is NOT a Cryptanalysis technique
Frequency Analysis
Known Plaintext Attack
Electronic Key Management
Brute Force Attack
4.
MULTIPLE CHOICE QUESTION
20 sec • 3 pts
If you just want to preserve Confidentiality using Asymmetric Encryption which key should you use to encrypt a message?
Sender's Private Key
Sender's Public Key
Receiver's Private Key
Receiver's Public Key
5.
MULTIPLE CHOICE QUESTION
20 sec • 3 pts
If you just want to Authenticate the sender when using Asymmetric Encryption which key should you use to encrypt a message?
Sender's Private Key
Sender's Public Key
Receiver's Private Key
Receiver's Public Key
6.
MULTIPLE CHOICE QUESTION
10 sec • 3 pts
What is the name of the attack if an adversary replaces the public key of your intended recipient with a new one they created?
Brute Force Attack
Man-in-the-Middle Attack
Known Plaintext Attack
Denial of Service Attack
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?