Search Header Logo

Information Security UK 5

Authored by Udhayakumar Shanmugam

Computers

University

Used 1+ times

Information Security UK 5
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Public Key Encryption is also called as .......................

Asymmetric Key Encryption

Symmetric Key Encryption

Hash

Signature

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hash function is a function that takes an input (or 'message') and returns a.............................. string of bytes

Fixed Size

Variable size

64bytes

128bits

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An example for hash Function is.........

SHA

MD5

Both

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

.......................... was designed to provide all four aspects of security, i.e., privacy, integrity, authentication, and non-repudiation in the sending of email.

PGP

KGB

MIME

SHA

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

PGP stands for ............................

Pretty Good Protection

Pretty Good Privacy

Privacy Good Protection

Privacy Generated Publickey

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ................................is an electronic, encrypted, stamp of authentication on digital information such as email messages, macros, or electronic documents.

digital signature

Email

Hash value

Public key

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Digital Signature the Sender uses ................key

Private

Public

both

none

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?