Search Header Logo

Information Assurance and Security 1 Midterm

Authored by Regino Vll Guinto

Information Technology (IT)

University

Used 2+ times

Information Assurance and Security 1 Midterm
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

46 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which goal of cryptography is achieved by using hash functions to verify that a file has not been altered since it was created?

Confidentiality

Availability

Authentication

Integrity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the technical term for the scrambled, unreadable result after an encryption algorithm has been applied to the readable message?

Plaintext

Key Stream

Ciphertext

Hash

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The security of a modern cryptosystem relies primarily on the secrecy and complexity of the key, even if the algorithm is publicly known. This concept aligns with:

The CIA Triad

The principle of Least Privilege

Kerckhoffs's Principle

The Bell-LaPadula Model

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Caesar Cipher is an example of which type of classical cryptographic technique?

Transposition Cipher

Substitution Cipher

Block Cipher

Stream Cipher

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Classical relies on computers; Modern relies on manual methods. Which is correct?

Classical relies on computers; Modern relies on manual methods.

Classical focuses on confidentiality; Modern focuses on integrity.

Classical relies on the secrecy of the algorithm; Modern relies on the secrecy of the key.

Classical uses symmetric keys, Modern uses asymmetric keys.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of encryption is defined using a single, shared secret key for both encryption and decryption?

Asymmetric Encryption

Public-Key Cryptography

Symmetric Encryption

Digital Signature

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Advanced Encryption Standard (AES) is a widely used example of which type of algorithm?

Asymmetric Algorithm

Hash Function

Symmetric Encryption Algorithm

Digital Signature Scheme

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?