Security+Q3

Security+Q3

University

10 Qs

quiz-placeholder

Similar activities

Cryptographic fundamentals for IoT

Cryptographic fundamentals for IoT

University

15 Qs

Quiz-1 Classical Encryption Techniques

Quiz-1 Classical Encryption Techniques

University

14 Qs

CSP Unit 10 Cybersecurity

CSP Unit 10 Cybersecurity

12th Grade - University

13 Qs

IT Participation 6

IT Participation 6

University

15 Qs

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

University

10 Qs

ITBP301_Chapter 02

ITBP301_Chapter 02

University

10 Qs

Chapter 10: Encryption Techniques

Chapter 10: Encryption Techniques

University

10 Qs

Security

Security

12th Grade - University

12 Qs

Security+Q3

Security+Q3

Assessment

Quiz

Computers

University

Easy

Created by

Mrinmoy Purkayastha

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Changing the original text to a secret message using cryptography is known as which of the following?

encryption

hashing

algorithm

coding

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A mathematical value entered into the algorithm to produce ciphertext, or text that is “scrambled” is known as which of the following?

cipher

cleartext

key

blocktext

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The process of proving that a user performed an action, such as sending an email message, is known as which of the following?

steganography

obfuscation

availability

non-repudiation

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which cryptography algorithm was approved by the NIST in late 2000 as a replacement for DES?

RC1

AES

IDEA

Blowfish

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Cryptography can also be applied to entire disks. This is known as which of the following?

Elliptic Curve Cryptography

Digital Signature Algorithm

Trusted Platform Module

Full disk encryption

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which encryption option is essentially a chip on the motherboard of the computer that provides cryptographic services?

SED

TPM

FDE

PGP

7.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

____ cryptographic algorithms use the same single key to encrypt and decrypt a message.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?