SBIP : CHAPTER 2

SBIP : CHAPTER 2

University

10 Qs

quiz-placeholder

Similar activities

DES- Encryption

DES- Encryption

University

8 Qs

Cryptographic fundamentals for IoT

Cryptographic fundamentals for IoT

University

15 Qs

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

University

10 Qs

EC335 - Quiz 1

EC335 - Quiz 1

University

10 Qs

Cryptography

Cryptography

University

15 Qs

Computer Security:Encryption

Computer Security:Encryption

10th Grade - University

10 Qs

Cyber Security

Cyber Security

9th Grade - University

14 Qs

H466 - 1.3.1 - Understanding Encryption Methods

H466 - 1.3.1 - Understanding Encryption Methods

12th Grade - University

15 Qs

SBIP : CHAPTER 2

SBIP : CHAPTER 2

Assessment

Quiz

Computers

University

Hard

Created by

NUR (PKT)

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the CORRECT statement about policy

The authorization of access to data in a network, which is controlled by the network administrator

Document that outlines specific requirements or rules that must be met

The level of protection of transmitted data from passive attacks

Strong walls, well-guarded door to secure access – closed network

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Choose the CORRECT Policy Requirements​ ​ ​ ​

Identifications and Aunthentication
Access Control
Network Port
Decryption

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Identify the suitable PASSWORD REQUIREMENTS

Minimum length is 12 characters

Store password using irreversible encryption

Minimum complexity

Maximum length is 14 characters

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Select the Security Procedures

User Management Procedures

System Administration Procedure

Incident Response Procedure

Configuration Management Procedure

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"the process of encoding messages or information in such a way that only authorized parties can access it" Select the SUITABLE cryptographic terminologies

Cipher Text

Encryption

Decryption

Cryptanalysis

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Identify common communication encryption types

Symmetric Encryption

Asymmetric Encryption

Hash Encoding

White Encoding

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Choose the INCORRECT statement about Hash Encoding

transformation of a string of characters into a usually shorter fixed-length value

used to index and retrieve items in a database because it is faster to find the item using the shorter hashed key

computerized cryptography using a singular encryption key to guise an electronic message

where keys come in pairs. What one key encrypts, only the other can decrypt

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?