Security Quiz (General Revision)

Security Quiz (General Revision)

University

36 Qs

quiz-placeholder

Similar activities

IAT-II MA8551 Algebra and Number Theory

IAT-II MA8551 Algebra and Number Theory

University

40 Qs

MA8551 Algebra and Number Theory - Unit-5 Part-A&B

MA8551 Algebra and Number Theory - Unit-5 Part-A&B

University

36 Qs

MATEMATIK TINGKATAN 4

MATEMATIK TINGKATAN 4

10th Grade - University

40 Qs

Advance Statistics Diagnostic Test

Advance Statistics Diagnostic Test

University

40 Qs

SCR, TRIAC and DIAC

SCR, TRIAC and DIAC

University

40 Qs

Emags Quiz 2

Emags Quiz 2

University

34 Qs

FINAL EXAMINATION IN NUMBER THEORY

FINAL EXAMINATION IN NUMBER THEORY

University

35 Qs

ABSTRACT ALGEBRA

ABSTRACT ALGEBRA

University

40 Qs

Security Quiz (General Revision)

Security Quiz (General Revision)

Assessment

Quiz

Mathematics

University

Medium

Created by

Ramy Shaaban

Used 5+ times

FREE Resource

36 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following is a property of a cryptographic system (Select all that apply)

Authentication

Confidentiality

Reality

Availability

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is implemented to execute the confidentiality in the cryptographic system

Encryption

Mathematical Background

Euler Theorem

Authentication

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the difference between block cipher and stream cipher

block cipher is easier

block cipher is faster

stream cipher generate a key for each message

None of the above

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

DES is an example of

Symmetric Encryption

Assymmetric Encryption

All of the above

None of the above

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The problem of Symmetric Encryption is

Complexity

Key Exchange

Time

None of the above

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT a mode of operation in block cipher

ECB

CBC

OFB

GCD

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

to overcome the problem of the different size of the last message block, we use

reverse engineering

encryption

padding

segmentation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Mathematics