CYB125 - Ch7

CYB125 - Ch7

University

31 Qs

quiz-placeholder

Similar activities

TIME - UX

TIME - UX

University

35 Qs

HTML Y SQL

HTML Y SQL

University

27 Qs

UTS Data Warehouse

UTS Data Warehouse

University

30 Qs

Икт 151-185

Икт 151-185

University

36 Qs

Part 3 (101-125)

Part 3 (101-125)

University

26 Qs

Blockchain Quiz

Blockchain Quiz

University

29 Qs

Exploring Relational Data Concepts

Exploring Relational Data Concepts

University

30 Qs

Graphical User Interface (No picture)

Graphical User Interface (No picture)

University

30 Qs

CYB125 - Ch7

CYB125 - Ch7

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Damon Vogel

Used 1+ times

FREE Resource

31 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Maria receives a ciphertext message from her colleague Wen. What type of function does Maria need to use to read the plaintext message?

Encryption

Hashing

Decryption

Validation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which approach to cryptography uses highly parallel algorithms that could solve problems in a fraction of the time needed by conventional computers?

Quantum cryptography

Asymmetric cryptography

Elliptic curve cryptography

Classic cryptography

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bob is sending a message to Alice. He wants to ensure that nobody can read the content of the message while it is in transit. What goal of cryptography is Bob attempting to achieve?

Confidentiality

Integrity

Authentication

Nonrepudiation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bob is sending a message to Alice. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Bob attempting to achieve?

Confidentiality

Integrity

Authentication

Nonrepudiation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When Alice receives a message from Bob, she wants to be able to demonstrate to Miriam that the message actually came from Bob. What goal of cryptography is Alice attempting to achieve?

Confidentiality

Integrity

Authentication

Nonrepudiation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice would like to send a message to Bob securely and wishes to use asymmetric encryption to encrypt the contents of the message. What key does she use to encrypt this message?

Alice's public key

Alice's private key

Bob's public key

Bob's private key

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Security objectives add value to relationships between businesses or between businesses and their customers. Which objective binds a message or data to a specific entity?

Message authentication

Digital signature

Receipt and confirmation

Nonrepudiation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?