Cyber Security

Cyber Security

University

23 Qs

quiz-placeholder

Similar activities

Week 12 - Module 5 Unit 3 Using Access Control

Week 12 - Module 5 Unit 3 Using Access Control

University

20 Qs

CySa+ PT 4: 2/3

CySa+ PT 4: 2/3

9th Grade - Professional Development

20 Qs

DSP-Minor1

DSP-Minor1

University

20 Qs

Cryptography

Cryptography

University

23 Qs

CIW IBA Lesson 8 Vocabulary

CIW IBA Lesson 8 Vocabulary

8th Grade - Professional Development

21 Qs

IAS 101 - Week 11 and 12 - Cryptography

IAS 101 - Week 11 and 12 - Cryptography

University

20 Qs

019_Certificates - CompTIA Security+ SY0-701 - 1.4

019_Certificates - CompTIA Security+ SY0-701 - 1.4

9th Grade - University

19 Qs

Episode 16

Episode 16

University

18 Qs

Cyber Security

Cyber Security

Assessment

Quiz

Computers

University

Hard

Created by

Judgi Nagarajan

Used 37+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

1.     In an asymmetric -key cipher, the sender uses the …………….key

Private

Public

none of the above

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In an asymmetric -key cipher, the receiver uses the …………….key

Private

Public

none of the above

3.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

1.     One commonly used public-key cryptography method is the …………………….algorithm

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In public key cryptosystem which is kept as public?

     Encryption keys

     Decryption keys

     Encryption and Decryption keys

   None of the above

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A cryptographic hash function has variable output length.

True

False

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

          ........................... is a famous technological medium for the spread of malware,facing problems of spam, & phishing attacks.

Cloud

Website

Pen drive

email

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In RSA, Ф(n) = in terms of p and q

(p)/(q)

(p)(q)

(p-1)(q-1)

(p+1)(q+1)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?