
Information Assurance and Security 1 Midterm
Authored by Regino Vll Guinto
Information Technology (IT)
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
46 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which goal of cryptography is achieved by using hash functions to verify that a file has not been altered since it was created?
Confidentiality
Availability
Authentication
Integrity
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the technical term for the scrambled, unreadable result after an encryption algorithm has been applied to the readable message?
Plaintext
Key Stream
Ciphertext
Hash
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The security of a modern cryptosystem relies primarily on the secrecy and complexity of the key, even if the algorithm is publicly known. This concept aligns with:
The CIA Triad
The principle of Least Privilege
Kerckhoffs's Principle
The Bell-LaPadula Model
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Caesar Cipher is an example of which type of classical cryptographic technique?
Transposition Cipher
Substitution Cipher
Block Cipher
Stream Cipher
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Classical relies on computers; Modern relies on manual methods. Which is correct?
Classical relies on computers; Modern relies on manual methods.
Classical focuses on confidentiality; Modern focuses on integrity.
Classical relies on the secrecy of the algorithm; Modern relies on the secrecy of the key.
Classical uses symmetric keys, Modern uses asymmetric keys.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of encryption is defined using a single, shared secret key for both encryption and decryption?
Asymmetric Encryption
Public-Key Cryptography
Symmetric Encryption
Digital Signature
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Advanced Encryption Standard (AES) is a widely used example of which type of algorithm?
Asymmetric Algorithm
Hash Function
Symmetric Encryption Algorithm
Digital Signature Scheme
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?