6441-w8-revision

6441-w8-revision

University

9 Qs

quiz-placeholder

Similar activities

mobile lagends

mobile lagends

5th Grade - Professional Development

14 Qs

R&S CHAPTER 5

R&S CHAPTER 5

University

12 Qs

Detroit become human

Detroit become human

University

14 Qs

Blockchain Technology (Basic) Quiz I

Blockchain Technology (Basic) Quiz I

University

10 Qs

Is it Bullying or Just Peer Conflict?

Is it Bullying or Just Peer Conflict?

KG - University

13 Qs

Alice and wonderland quizz

Alice and wonderland quizz

KG - Professional Development

12 Qs

ICAO/ NATO Alphabet

ICAO/ NATO Alphabet

University

10 Qs

Quelle est le message...GIEC et autre

Quelle est le message...GIEC et autre

University

10 Qs

6441-w8-revision

6441-w8-revision

Assessment

Quiz

Other

University

Hard

Created by

Sage B

Used 3+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a type 1 error is someone who isn't you unlocking your phone with a fingerprint reader, what's the corresponding type 2 error?

Someone guessing your pin

The money they transfer themself while in your phone

Someone who isn't you getting in using face ID

Getting locked out of your phone when it can't recognise your fingerprint

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

A

B

C

D

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice wants to send a private message to bob. What's the first step using RSA?

Alice encrypts the message using her private key

Alice encrypts the message using her public key

Alice encrypts the message using Bob's public key

Alice encrypts the message using Bob's private key

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is NOT an example of security by obscurity

Hiding a key under a rock

Security guard by the access card readers in the entrance of a building

making it illegal to publish the source code for COVID tracing softwarM

Obfuscated code

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many of these password hints are helpful?

- Passwords should expire every 6 months

- Complexity requirements - e.g. one capital letter, number, symbol

- Passwords should be compared agains breach databse and rejected if there is a match

0

1

2

3

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A MAC is designed to provide

Neither Confidentiality nor Integrity

Integrity but not Confidentiality

Confidentiality but not Integrity

Confidentiality and Integrity

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Given a cryptographic hash function, which is most likely easier:

Finding two different messages with identical hash values

Given the hash of a message, finding the original message

Given a hash value, finding a message which hashes to that val

Containing Horses

8.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

How many bits of security does a padlock with 3 pins have?

3

8

10

1000

9.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

How many bits to represent the decimal 2000?