Search Header Logo

CYB125 - Ch7

Authored by Anonymous Anonymous

Information Technology (IT)

University

Used 1+ times

CYB125 - Ch7
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

31 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Maria receives a ciphertext message from her colleague Wen. What type of function does Maria need to use to read the plaintext message?

Encryption

Hashing

Decryption

Validation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which approach to cryptography uses highly parallel algorithms that could solve problems in a fraction of the time needed by conventional computers?

Quantum cryptography

Asymmetric cryptography

Elliptic curve cryptography

Classic cryptography

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bob is sending a message to Alice. He wants to ensure that nobody can read the content of the message while it is in transit. What goal of cryptography is Bob attempting to achieve?

Confidentiality

Integrity

Authentication

Nonrepudiation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bob is sending a message to Alice. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Bob attempting to achieve?

Confidentiality

Integrity

Authentication

Nonrepudiation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When Alice receives a message from Bob, she wants to be able to demonstrate to Miriam that the message actually came from Bob. What goal of cryptography is Alice attempting to achieve?

Confidentiality

Integrity

Authentication

Nonrepudiation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice would like to send a message to Bob securely and wishes to use asymmetric encryption to encrypt the contents of the message. What key does she use to encrypt this message?

Alice's public key

Alice's private key

Bob's public key

Bob's private key

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Security objectives add value to relationships between businesses or between businesses and their customers. Which objective binds a message or data to a specific entity?

Message authentication

Digital signature

Receipt and confirmation

Nonrepudiation

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?