Information Assurance and Security 1 Midterm

Information Assurance and Security 1 Midterm

University

46 Qs

quiz-placeholder

Similar activities

TechJar Round 1

TechJar Round 1

University

45 Qs

Kuis: Penerapan AI pada Website, Aplikasi, dan Game

Kuis: Penerapan AI pada Website, Aplikasi, dan Game

12th Grade - University

50 Qs

Ujian Akhir Semester 1

Ujian Akhir Semester 1

8th Grade - University

45 Qs

Кәсіби ағылшын 51 - 100

Кәсіби ағылшын 51 - 100

University

50 Qs

SUMATIF Scracth kelas 8

SUMATIF Scracth kelas 8

8th Grade - University

50 Qs

LATIHAN SAS INFORMATIKA KELAS 9

LATIHAN SAS INFORMATIKA KELAS 9

9th Grade - University

45 Qs

Pengantar Teknologi Informasi

Pengantar Teknologi Informasi

University

50 Qs

Uji Pengetahuan Informatika Kelas 8

Uji Pengetahuan Informatika Kelas 8

8th Grade - University

50 Qs

Information Assurance and Security 1 Midterm

Information Assurance and Security 1 Midterm

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Easy

Created by

Regino Vll Guinto

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

46 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which goal of cryptography is achieved by using hash functions to verify that a file has not been altered since it was created?

Confidentiality

Availability

Authentication

Integrity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the technical term for the scrambled, unreadable result after an encryption algorithm has been applied to the readable message?

Plaintext

Key Stream

Ciphertext

Hash

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The security of a modern cryptosystem relies primarily on the secrecy and complexity of the key, even if the algorithm is publicly known. This concept aligns with:

The CIA Triad

The principle of Least Privilege

Kerckhoffs's Principle

The Bell-LaPadula Model

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Caesar Cipher is an example of which type of classical cryptographic technique?

Transposition Cipher

Substitution Cipher

Block Cipher

Stream Cipher

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Classical relies on computers; Modern relies on manual methods. Which is correct?

Classical relies on computers; Modern relies on manual methods.

Classical focuses on confidentiality; Modern focuses on integrity.

Classical relies on the secrecy of the algorithm; Modern relies on the secrecy of the key.

Classical uses symmetric keys, Modern uses asymmetric keys.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of encryption is defined using a single, shared secret key for both encryption and decryption?

Asymmetric Encryption

Public-Key Cryptography

Symmetric Encryption

Digital Signature

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Advanced Encryption Standard (AES) is a widely used example of which type of algorithm?

Asymmetric Algorithm

Hash Function

Symmetric Encryption Algorithm

Digital Signature Scheme

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?