CB3491 CRYPTOGRAPHY AND CYBER SECURITY

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

University

10 Qs

quiz-placeholder

Similar activities

Symmetric Cryptography

Symmetric Cryptography

University

10 Qs

Keamanan Informasi 2

Keamanan Informasi 2

University

15 Qs

LESSON 6 CRYPTOGRAPHY

LESSON 6 CRYPTOGRAPHY

University

14 Qs

8th module23

8th module23

University

13 Qs

Information Assurance Midterm Quiz

Information Assurance Midterm Quiz

University

15 Qs

D15A-CNS-Quiz1-Set A

D15A-CNS-Quiz1-Set A

University

15 Qs

Chapter 16

Chapter 16

University

15 Qs

DATA AND NETWORK SECURITY

DATA AND NETWORK SECURITY

University

15 Qs

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

Assessment

Quiz

Computers

University

Hard

Created by

Sabeetha S

Used 9+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of converting plain text into cipher text is _________________

decryption
encoding
hashing
encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Symmetric encryption is also known as _______________

public key encryption
asymmetric encryption
hash-based encryption
secret key encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Caesar cipher is a _________ cipher that has a key of 3.

transposition
block

additive

stream

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The ___________ cipher reorders the plain text characters to create a cipher text.

substitution
hashing
transposition
encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following stage of cryptography are the non readable encrypted data?

key
hash
plaintext
ciphertext

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of encryption uses the same key for both encryption and decryption?

Asymmetric encryption
Hashing
Base64 encoding
Symmetric encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a characteristic of a good encryption algorithm?

Confidentiality

Integrity

Availability

Authenticity

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?