Cryptography and Network Security Quiz 3

Cryptography and Network Security Quiz 3

University

10 Qs

quiz-placeholder

Similar activities

PRETEST PERTEMUAN 3

PRETEST PERTEMUAN 3

University

11 Qs

Unit 3 - 4.5.1 Endpoint Protocol and Email Security

Unit 3 - 4.5.1 Endpoint Protocol and Email Security

9th Grade - University

9 Qs

S3 Computing Security Quiz

S3 Computing Security Quiz

KG - University

10 Qs

Ch 3 Elementor Forms

Ch 3 Elementor Forms

9th Grade - University

9 Qs

Unit 11: HTTP FTP SMTP

Unit 11: HTTP FTP SMTP

University

8 Qs

Quiz 8 Keamanan Jaringan 2021-1

Quiz 8 Keamanan Jaringan 2021-1

University

5 Qs

Identifying Security Threats and Vulnerabilities

Identifying Security Threats and Vulnerabilities

University

10 Qs

Lesson 4 - Using Email Quiz

Lesson 4 - Using Email Quiz

6th Grade - University

14 Qs

Cryptography and Network Security Quiz 3

Cryptography and Network Security Quiz 3

Assessment

Quiz

Instructional Technology, Computers

University

Hard

Created by

Jainulabudeen S A K

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

X.509 defines alternative authentication protocols based on the use of _______ key certificates

Public

Private

Hybrid

Master

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In S/MIME certificate processing A User's public key must be registered with a certificate authority in order to receive an _______ key

X.509 Private

X.507 Public

X.509 Public

X.507 Private

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A full service kerberos environment consisting of a _________

Servers

Clients

Application Servers

All the mentioned

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The simplest ________ attack is one in which the opponent simply copies a message and reply later

React

Counter

Reply

None Mentioned

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____________ is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss or compromise

Email hacking

Email Protection

Email Safeguarding

Email Security

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Using email hacking illicit hackers can send & spread _____ virus _____ and spam emails

Cracked software, redirected malicious URLs

Malware, Security Patches

Antivirus, Patches C

Trojans, Redirected Malicious URLs

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If the data stored in the __ is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie

Hard drive

Quarantine

Cookies

Memory

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Instructional Technology