Quiz 1

Quiz 1

University

11 Qs

quiz-placeholder

Similar activities

GEMATMW - Cryptography

GEMATMW - Cryptography

University - Professional Development

16 Qs

EC335 - Quiz 1

EC335 - Quiz 1

University

10 Qs

Cryptology

Cryptology

9th Grade - University

15 Qs

Cryptographic fundamentals for IoT

Cryptographic fundamentals for IoT

University

15 Qs

Chapter 6 (Fundamentals of Cybersecurity

Chapter 6 (Fundamentals of Cybersecurity

University

10 Qs

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

University

10 Qs

Lecture 4

Lecture 4

University

10 Qs

Quantum Computing

Quantum Computing

8th Grade - University

10 Qs

Quiz 1

Quiz 1

Assessment

Quiz

Computers

University

Hard

Created by

Osama Alhodairy

Used 3+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

___________are the three fundamental goals of information security

Confidentiality, Integrity, and  Availability

Classic cryptography , and

Symmetric ciphers

Public key , and cryptography

Multilevel security, and Firewalls, Authorization

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

 In cryptography, what is cipher?

algorithm for performing encryption and decryption

encrypted message

both (a) and (b)

none of the mentioned

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

. In asymmetric key cryptography, the private key is kept by _____.

sender

receiver

sender and receiver

all the connected devices to the network

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cryptanalysis is used ______.

to find some insecurity in a cryptographic scheme

to increase the speed

to encrypt the data

none of the mentioned

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A denial of service attack

can erase an entire Web site.

does not have to occur over a network.

is an intentional attempt to overload a Web server or Web site.

all of the above.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Authentication is

Passwords

Biometrics

Other methods of authentication

All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Authorization is

Access Control Lists/Capabilities

Firewalls, intrusion detection (IDS)

Multilevel security (MLS),

All of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?