Cryptography and Computer Security Quiz 4

Cryptography and Computer Security Quiz 4

University

15 Qs

quiz-placeholder

Similar activities

Cryptographic fundamentals for IoT

Cryptographic fundamentals for IoT

University

15 Qs

NSC INTRODUCTION

NSC INTRODUCTION

University

10 Qs

SYO 701 CRYPTOGRAPHY Module FC-2

SYO 701 CRYPTOGRAPHY Module FC-2

University

20 Qs

Exercise 1.2 DFS40143

Exercise 1.2 DFS40143

University

10 Qs

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

University

10 Qs

GEMATMW - Cryptography

GEMATMW - Cryptography

University - Professional Development

16 Qs

EC335 - Quiz 1

EC335 - Quiz 1

University

10 Qs

019_Certificates - CompTIA Security+ SY0-701 - 1.4

019_Certificates - CompTIA Security+ SY0-701 - 1.4

9th Grade - University

19 Qs

Cryptography and Computer Security Quiz 4

Cryptography and Computer Security Quiz 4

Assessment

Quiz

Computers

University

Hard

Created by

dyfhnc6jdd apple_user

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the study of encrypting/hiding data called?

Cryptology

Cryptography

Algorithm

Cryptanalysis

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the reverse of encryption?

Algorithm

Cipher

Decryption

Cryptography

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the output of encrypted plaintext data called?

Ciphertext

Algorithm

Plaintext

Key

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of cryptography in computer security?

Ensuring data integrity

Providing authentication

All of the above

Achieving confidentiality

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the two types of operations used for encrypting information?

Substitution and Transposition

Sorting and Filtering

Addition and Multiplication

Encoding and Decoding

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the universal technique for providing confidentiality for transmitted or stored data?

Symmetric encryption

Asymmetric encryption

Public-key encryption

Stream cipher

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the 5 ingredients in symmetric encryption?

Plaintext, Encryption algorithm, Public key, Ciphertext, Decryption algorithm

Plaintext, Encryption algorithm, Secret key, Ciphertext, Decryption algorithm

Ciphertext, Secret key, Public key, Decryption algorithm, Encryption algorithm

Plaintext, Secret key, Public key, Ciphertext, Decryption algorithm

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?