
Quiz 1
Authored by Osama Alhodairy
Computers
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
___________are the three fundamental goals of information security
Confidentiality, Integrity, and Availability
Classic cryptography , and
Symmetric ciphers
Public key , and cryptography
Multilevel security, and Firewalls, Authorization
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In cryptography, what is cipher?
algorithm for performing encryption and decryption
encrypted message
both (a) and (b)
none of the mentioned
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
. In asymmetric key cryptography, the private key is kept by _____.
sender
receiver
sender and receiver
all the connected devices to the network
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Cryptanalysis is used ______.
to find some insecurity in a cryptographic scheme
to increase the speed
to encrypt the data
none of the mentioned
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A denial of service attack
can erase an entire Web site.
does not have to occur over a network.
is an intentional attempt to overload a Web server or Web site.
all of the above.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Authentication is
Passwords
Biometrics
Other methods of authentication
All of the above
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Authorization is
Access Control Lists/Capabilities
Firewalls, intrusion detection (IDS)
Multilevel security (MLS),
All of the above
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?