
CNS Quiz
Authored by Thilagavathi AVCS093
Engineering
University
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The keys used in cryptography are
secret key
private key
public key
All of them
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Cryptography, a word with Greek origins, means
corrupting data
secret writing
open writing
closed writing
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A transposition cipher reorders (permutes) symbols in a
block of packets
block of slots
block of signals
block of symbols
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Network Security provides authentication and access control for resources.
TRUE
FALSE
may be true
may be false
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which is not an objective of network security?
identification
authentication
access control
lock
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The process of verifying the identity of a user.
authentication
identification
validation
verification
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is a part of network identification?
user id
password
otp
fingerprint
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?