Croteau SY110 L18&19 AY25

Croteau SY110 L18&19 AY25

University

6 Qs

quiz-placeholder

Similar activities

Prevention

Prevention

1st Grade - Professional Development

10 Qs

Blockchain 3

Blockchain 3

University

5 Qs

Symmetric cipher model

Symmetric cipher model

University

10 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

ICT 3 INFORMATION ASSURANCE AND SECURITY

ICT 3 INFORMATION ASSURANCE AND SECURITY

University

10 Qs

ITE-13-Quiz-02

ITE-13-Quiz-02

University

10 Qs

OSI Model quizz

OSI Model quizz

University

8 Qs

Module 11 (Fundamentals of Cybersecurity)

Module 11 (Fundamentals of Cybersecurity)

University

10 Qs

Croteau SY110 L18&19 AY25

Croteau SY110 L18&19 AY25

Assessment

Quiz

Computers

University

Hard

Created by

Brien Croteau

Used 3+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

What word is used to define a method to transform a message to conceal its meaning?

cipher

plaintext

ciphertext

key

2.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

What is the biggest challenge when deploying symmetric encryption?

length of ciphertext

key distribution

encryption algorithm

decryption speed

3.

MULTIPLE CHOICE QUESTION

20 sec • 3 pts

Which of the following is NOT a Cryptanalysis technique

Frequency Analysis

Known Plaintext Attack

Electronic Key Management

Brute Force Attack

4.

MULTIPLE CHOICE QUESTION

20 sec • 3 pts

If you just want to preserve Confidentiality using Asymmetric Encryption which key should you use to encrypt a message?

Sender's Private Key

Sender's Public Key

Receiver's Private Key

Receiver's Public Key

5.

MULTIPLE CHOICE QUESTION

20 sec • 3 pts

If you just want to Authenticate the sender when using Asymmetric Encryption which key should you use to encrypt a message?

Sender's Private Key

Sender's Public Key

Receiver's Private Key

Receiver's Public Key

6.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

What is the name of the attack if an adversary replaces the public key of your intended recipient with a new one they created?

Brute Force Attack

Man-in-the-Middle Attack

Known Plaintext Attack

Denial of Service Attack