6441-w8-revision

6441-w8-revision

University

9 Qs

quiz-placeholder

Similar activities

Consumer

Consumer

University

11 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

10 Qs

Detroit become human

Detroit become human

University

14 Qs

Mixed Methods Research Designs

Mixed Methods Research Designs

University

6 Qs

COPC

COPC

University

7 Qs

Ethics in Scientific Research

Ethics in Scientific Research

University

10 Qs

Work Immersion

Work Immersion

12th Grade - University

10 Qs

Kriptografi

Kriptografi

University

6 Qs

6441-w8-revision

6441-w8-revision

Assessment

Quiz

Other

University

Hard

Created by

Sage B

Used 3+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a type 1 error is someone who isn't you unlocking your phone with a fingerprint reader, what's the corresponding type 2 error?

Someone guessing your pin

The money they transfer themself while in your phone

Someone who isn't you getting in using face ID

Getting locked out of your phone when it can't recognise your fingerprint

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

A

B

C

D

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice wants to send a private message to bob. What's the first step using RSA?

Alice encrypts the message using her private key

Alice encrypts the message using her public key

Alice encrypts the message using Bob's public key

Alice encrypts the message using Bob's private key

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is NOT an example of security by obscurity

Hiding a key under a rock

Security guard by the access card readers in the entrance of a building

making it illegal to publish the source code for COVID tracing softwarM

Obfuscated code

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many of these password hints are helpful?

- Passwords should expire every 6 months

- Complexity requirements - e.g. one capital letter, number, symbol

- Passwords should be compared agains breach databse and rejected if there is a match

0

1

2

3

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A MAC is designed to provide

Neither Confidentiality nor Integrity

Integrity but not Confidentiality

Confidentiality but not Integrity

Confidentiality and Integrity

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Given a cryptographic hash function, which is most likely easier:

Finding two different messages with identical hash values

Given the hash of a message, finding the original message

Given a hash value, finding a message which hashes to that val

Containing Horses

8.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

How many bits of security does a padlock with 3 pins have?

3

8

10

1000

9.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

How many bits to represent the decimal 2000?