
Data and Digital Communications Final Quiz
Authored by Ram More
Computers
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is a method of concealing information from a recognizable text into encrypted form.
Decryption
Encryption
Cryptanalysis
Cryptology
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is the art of creating and using cryptosystems.
Cryptanalysis
Cryptography
Cryptology
Cryptosystem
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is the process of capturing the data packets traveling in the network.
Packet sniffing
Spoofing
Snooping
Masquerading
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is an attack that is aimed at preventing unauthorized users from accessing services on the network.
Man-in-the-Middle
Denial-of-Service
Trojan Horse
Spoofing
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The process of recovering a plaintext from its ciphertext.
Encryption
Decryption
Cryptology
Cryptanalysis
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is the process of verifying that the user is exactly who he/she claims to be.
Confidentiality
Authentication
Availability
Integrity
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is the art of ensuring that data is kept private and accessed only by the intended recipient.
Availability
Integrity
Authentication
Confidentiality
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?