CNS D15C- 22 August

CNS D15C- 22 August

University

30 Qs

quiz-placeholder

Similar activities

Автомобильдердің пайдалану қасиеттерінің теориясы

Автомобильдердің пайдалану қасиеттерінің теориясы

University

25 Qs

C Programming Worksheet Questions

C Programming Worksheet Questions

University

25 Qs

GPIO - Quiz

GPIO - Quiz

University

25 Qs

DECODEX

DECODEX

University

25 Qs

Quiz on IoT and Its Applications in Logistics

Quiz on IoT and Its Applications in Logistics

12th Grade - University

25 Qs

Gen-Z's Trailblazers -2k25 1

Gen-Z's Trailblazers -2k25 1

University

25 Qs

Gen-Z's Trailblazers -2k25 2

Gen-Z's Trailblazers -2k25 2

University

25 Qs

CNS D15C- 22 August

CNS D15C- 22 August

Assessment

Quiz

Engineering

University

Medium

Created by

Abhishek Chaudhari

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the primary goal of computer security?

Enhancing user experience

Protecting assets from unauthorized access, use, disclosure, disruption, modification, or destruction

Improving network speed

Reducing hardware costs

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the "C" in CIA triad stand for?

Confidentiality

Cryptography

Cybernetics

Classification

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security service ensures that data is not altered in transit?

Confidentiality

Integrity

Availability

Non-repudiation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A denial-of-service (DoS) attack primarily targets which aspect of the CIA triad?

Confidentiality

Integrity

Availability

Non-repudiation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Vigenère cipher is an example of a:

Mono-alphabetic substitution cipher

Poly-alphabetic substitution cipher

Transposition cipher

Stream cipher

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main principle behind a mono-alphabetic substitution cipher?

Shifting each letter of the plaintext by a fixed number of positions

Using a different substitution alphabet for each letter of the plaintext

Rearranging the order of the plaintext letters

Hiding a message within another message or file

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Steganography is the art and science of:

Securing communication by converting data into an unreadable format

Hiding the existence of a message

Preventing unauthorized access to a network

Detecting and preventing malware

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?