Cryptography and Network Security Quiz 3

Cryptography and Network Security Quiz 3

University

10 Qs

quiz-placeholder

Similar activities

Intro to Cisco Packet Tracer Quiz

Intro to Cisco Packet Tracer Quiz

11th Grade - University

10 Qs

CAPTCHA

CAPTCHA

University

15 Qs

Quiz 9 Keamanan Jaringan

Quiz 9 Keamanan Jaringan

University

5 Qs

Cyber security quiz 2

Cyber security quiz 2

University

10 Qs

Unit -14 Network Security

Unit -14 Network Security

University

7 Qs

uCertify JavaScript Chapter 6 Test

uCertify JavaScript Chapter 6 Test

9th Grade - University

15 Qs

8th module23

8th module23

University

13 Qs

Network Forensics and Log Capturing

Network Forensics and Log Capturing

University

15 Qs

Cryptography and Network Security Quiz 3

Cryptography and Network Security Quiz 3

Assessment

Quiz

Instructional Technology, Computers

University

Easy

Created by

Jainulabudeen S A K

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

X.509 defines alternative authentication protocols based on the use of _______ key certificates

Public

Private

Hybrid

Master

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In S/MIME certificate processing A User's public key must be registered with a certificate authority in order to receive an _______ key

X.509 Private

X.507 Public

X.509 Public

X.507 Private

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A full service kerberos environment consisting of a _________

Servers

Clients

Application Servers

All the mentioned

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The simplest ________ attack is one in which the opponent simply copies a message and reply later

React

Counter

Reply

None Mentioned

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____________ is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss or compromise

Email hacking

Email Protection

Email Safeguarding

Email Security

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Using email hacking illicit hackers can send & spread _____ virus _____ and spam emails

Cracked software, redirected malicious URLs

Malware, Security Patches

Antivirus, Patches C

Trojans, Redirected Malicious URLs

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If the data stored in the __ is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie

Hard drive

Quarantine

Cookies

Memory

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?