Search Header Logo

NSC Quiz 1

Authored by Simranpreet Kaur

Engineering

University

Used 1+ times

NSC Quiz 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

The process of making sure that the piece of data being claimed by the user belongs to him/her.

Confidentiality

Authentication

Non-repudiation

Data Integrity

2.

MULTIPLE SELECT QUESTION

10 mins • 1 pt

This type of cryptography uses a pair of keys to encrypt and decrypt the data.

Symmetric Key Cryptography

Hash Functions

Public Key Cryptography

Asymmetric Key Cryptography

3.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Virus is based on what type of malware?

Infection method

Action method

4.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

In which kind of attack the victim does not get informed of the attack?

Active Attack

Passive attack

5.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

A in CIA Model stands for?

Authentication

Availability

Accessibility

6.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Diffie-Hellman algorithm is what kind of algorithm?

Encryption Algorithm

Decryption Algorithm

Key-Exchange Algorithm

Key-Generation Algorithm

7.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

DES has a data input of how many bits?

128 bits

256 bits

64 bits

28 bits

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?