Quiz 1

Quiz 1

University

11 Qs

quiz-placeholder

Similar activities

Netw2-Quiz No.1 (final term)

Netw2-Quiz No.1 (final term)

University

15 Qs

Chapter 9

Chapter 9

University

9 Qs

Encryption

Encryption

University

12 Qs

Ecommerce Security

Ecommerce Security

University

10 Qs

Cryptography

Cryptography

University

15 Qs

TAC3121-Quiz 4

TAC3121-Quiz 4

University

10 Qs

Computer skills

Computer skills

University

10 Qs

Cybersecurity Fundamentals Week 4 Quiz

Cybersecurity Fundamentals Week 4 Quiz

KG - University

10 Qs

Quiz 1

Quiz 1

Assessment

Quiz

Computers

University

Hard

Created by

Osama Alhodairy

Used 3+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

___________are the three fundamental goals of information security

Confidentiality, Integrity, and  Availability

Classic cryptography , and

Symmetric ciphers

Public key , and cryptography

Multilevel security, and Firewalls, Authorization

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

 In cryptography, what is cipher?

algorithm for performing encryption and decryption

encrypted message

both (a) and (b)

none of the mentioned

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

. In asymmetric key cryptography, the private key is kept by _____.

sender

receiver

sender and receiver

all the connected devices to the network

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cryptanalysis is used ______.

to find some insecurity in a cryptographic scheme

to increase the speed

to encrypt the data

none of the mentioned

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A denial of service attack

can erase an entire Web site.

does not have to occur over a network.

is an intentional attempt to overload a Web server or Web site.

all of the above.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Authentication is

Passwords

Biometrics

Other methods of authentication

All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Authorization is

Access Control Lists/Capabilities

Firewalls, intrusion detection (IDS)

Multilevel security (MLS),

All of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?