Search Header Logo

Croteau SY110 L18&19 AY25

Authored by Brien Croteau

Computers

University

Used 3+ times

Croteau SY110 L18&19 AY25
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

What word is used to define a method to transform a message to conceal its meaning?

cipher

plaintext

ciphertext

key

2.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

What is the biggest challenge when deploying symmetric encryption?

length of ciphertext

key distribution

encryption algorithm

decryption speed

3.

MULTIPLE CHOICE QUESTION

20 sec • 3 pts

Which of the following is NOT a Cryptanalysis technique

Frequency Analysis

Known Plaintext Attack

Electronic Key Management

Brute Force Attack

4.

MULTIPLE CHOICE QUESTION

20 sec • 3 pts

If you just want to preserve Confidentiality using Asymmetric Encryption which key should you use to encrypt a message?

Sender's Private Key

Sender's Public Key

Receiver's Private Key

Receiver's Public Key

5.

MULTIPLE CHOICE QUESTION

20 sec • 3 pts

If you just want to Authenticate the sender when using Asymmetric Encryption which key should you use to encrypt a message?

Sender's Private Key

Sender's Public Key

Receiver's Private Key

Receiver's Public Key

6.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

What is the name of the attack if an adversary replaces the public key of your intended recipient with a new one they created?

Brute Force Attack

Man-in-the-Middle Attack

Known Plaintext Attack

Denial of Service Attack

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?