CNS D15C- 22 August

CNS D15C- 22 August

University

30 Qs

quiz-placeholder

Similar activities

AIChE OAU ChemE-Jeopardy Preliminaries

AIChE OAU ChemE-Jeopardy Preliminaries

University

25 Qs

INS Class Activity -1

INS Class Activity -1

University

35 Qs

Cryptography Unit1

Cryptography Unit1

University

25 Qs

Cybersecurity and Privacy Unit 1.2  Quiz

Cybersecurity and Privacy Unit 1.2 Quiz

University

25 Qs

Safety Quiz

Safety Quiz

7th Grade - University

35 Qs

II ECE_PCB Design Quiz

II ECE_PCB Design Quiz

University

25 Qs

Techsaavy Codeathon 2k25 Round 1

Techsaavy Codeathon 2k25 Round 1

University

25 Qs

D17 CHECK YOUR LEVEL

D17 CHECK YOUR LEVEL

University

25 Qs

CNS D15C- 22 August

CNS D15C- 22 August

Assessment

Quiz

Engineering

University

Medium

Created by

Abhishek Chaudhari

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the primary goal of computer security?

Enhancing user experience

Protecting assets from unauthorized access, use, disclosure, disruption, modification, or destruction

Improving network speed

Reducing hardware costs

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the "C" in CIA triad stand for?

Confidentiality

Cryptography

Cybernetics

Classification

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security service ensures that data is not altered in transit?

Confidentiality

Integrity

Availability

Non-repudiation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A denial-of-service (DoS) attack primarily targets which aspect of the CIA triad?

Confidentiality

Integrity

Availability

Non-repudiation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Vigenère cipher is an example of a:

Mono-alphabetic substitution cipher

Poly-alphabetic substitution cipher

Transposition cipher

Stream cipher

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main principle behind a mono-alphabetic substitution cipher?

Shifting each letter of the plaintext by a fixed number of positions

Using a different substitution alphabet for each letter of the plaintext

Rearranging the order of the plaintext letters

Hiding a message within another message or file

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Steganography is the art and science of:

Securing communication by converting data into an unreadable format

Hiding the existence of a message

Preventing unauthorized access to a network

Detecting and preventing malware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?