SECURE COMMUNICATION MODULE 5

SECURE COMMUNICATION MODULE 5

University

15 Qs

quiz-placeholder

Similar activities

Security

Security

12th Grade - University

12 Qs

Cryptology Tools

Cryptology Tools

University

15 Qs

ITBP301_Chapter 04

ITBP301_Chapter 04

University

10 Qs

Module 7 (Fundamentals of Cybersecurity)

Module 7 (Fundamentals of Cybersecurity)

University

10 Qs

Cryptography Basics

Cryptography Basics

University

20 Qs

Quiz 1

Quiz 1

University

11 Qs

blockchain

blockchain

University

19 Qs

Week 10 - Cyber Attacks Exercise 2

Week 10 - Cyber Attacks Exercise 2

University

10 Qs

SECURE COMMUNICATION MODULE 5

SECURE COMMUNICATION MODULE 5

Assessment

Quiz

Computers

University

Hard

Created by

NITHYA M.

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

1. Which figure implements confidentiality and authentication?

Media Image
Media Image
Media Image
Media Image

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Another name for Message authentication codes is

cryptographic codebreak

cryptographic codesum

cryptographic checksum

cryptographic checkbreak

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For a 150-bit message and a 10-bit MAC, how many values are the MAC value dependent on?

2140

2150

215

210

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

MAC is a

one-to-one mapping

many-to-one mapping

onto mapping

none of the mentioned

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Confidentiality can only be provided if we perform message encryption before the MAC generation.

true

false

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the meaning of crypt

hidden writing

secret writing

copy

none of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are the applications of cryptography?

digital signature

authentication

key generation

all of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?