IAS CH2 QUIZ

IAS CH2 QUIZ

University

25 Qs

quiz-placeholder

Similar activities

202309 BMIT27x3 Revision Quiz 2

202309 BMIT27x3 Revision Quiz 2

University

20 Qs

CNS BASiCS

CNS BASiCS

University

20 Qs

TestOut SecurityPro (9.1 - 9.4)

TestOut SecurityPro (9.1 - 9.4)

University

27 Qs

Public key cryptosystems

Public key cryptosystems

University

22 Qs

2022 | ICTC0713 | NW2B | Final Term Exam

2022 | ICTC0713 | NW2B | Final Term Exam

University

30 Qs

Social Issues and Professional Practices Midterm Exam

Social Issues and Professional Practices Midterm Exam

University

20 Qs

BAPE 5 Quiz 4 (3A)

BAPE 5 Quiz 4 (3A)

University

30 Qs

Data Comm 4

Data Comm 4

University

20 Qs

IAS CH2 QUIZ

IAS CH2 QUIZ

Assessment

Quiz

Computers

University

Easy

Created by

Darwin Vargas

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Symmetric encryption remains by far the most widely used of the two types of encryption.

TRUE

FALSE

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rotor machines are sophisticated precomputer hardware devices that use substitution techniques.

TRUE

FALSE

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Symmetric encryption is a form of cryptosystem in which encryption and decryption are performed using different keys. It is also known as non- conventional encryption.

TRUE

FALSE

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

With the use of symmetric encryption, the principal security problem is maintaining the secrecy of the key.

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of converting from plaintext to ciphertext is known as deciphering or decryption.

TRUE

FALSE

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The algorithm will produce a different output depending on the specific secret key being used at the time. The exact substitutions and transformations performed by the algorithm depend on the key.

TRUE

FALSE

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When using symmetric encryption it is very important to keep the algorithm secret.

TRUE

FALSE

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?