Croteau SY110 L18&19 AY25

Croteau SY110 L18&19 AY25

University

6 Qs

quiz-placeholder

Similar activities

Seguridad de la Red Grupo 5

Seguridad de la Red Grupo 5

University

10 Qs

Computer Security:Encryption

Computer Security:Encryption

10th Grade - University

10 Qs

EC335 - Quiz 1

EC335 - Quiz 1

University

10 Qs

Quiz 1

Quiz 1

University

11 Qs

PENILAIAN FORMATIF SSK 3013

PENILAIAN FORMATIF SSK 3013

University

9 Qs

Week 10 - Cyber Attacks Exercise 2

Week 10 - Cyber Attacks Exercise 2

University

10 Qs

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

University

10 Qs

Asymmetric encryption

Asymmetric encryption

12th Grade - University

10 Qs

Croteau SY110 L18&19 AY25

Croteau SY110 L18&19 AY25

Assessment

Quiz

Computers

University

Hard

Created by

Brien Croteau

Used 3+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

What word is used to define a method to transform a message to conceal its meaning?

cipher

plaintext

ciphertext

key

2.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

What is the biggest challenge when deploying symmetric encryption?

length of ciphertext

key distribution

encryption algorithm

decryption speed

3.

MULTIPLE CHOICE QUESTION

20 sec • 3 pts

Which of the following is NOT a Cryptanalysis technique

Frequency Analysis

Known Plaintext Attack

Electronic Key Management

Brute Force Attack

4.

MULTIPLE CHOICE QUESTION

20 sec • 3 pts

If you just want to preserve Confidentiality using Asymmetric Encryption which key should you use to encrypt a message?

Sender's Private Key

Sender's Public Key

Receiver's Private Key

Receiver's Public Key

5.

MULTIPLE CHOICE QUESTION

20 sec • 3 pts

If you just want to Authenticate the sender when using Asymmetric Encryption which key should you use to encrypt a message?

Sender's Private Key

Sender's Public Key

Receiver's Private Key

Receiver's Public Key

6.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

What is the name of the attack if an adversary replaces the public key of your intended recipient with a new one they created?

Brute Force Attack

Man-in-the-Middle Attack

Known Plaintext Attack

Denial of Service Attack