Cryptography UK 1

Cryptography UK 1

University

10 Qs

quiz-placeholder

Similar activities

ASAS SAINS KOMPUTER T3

ASAS SAINS KOMPUTER T3

12th Grade - University

15 Qs

iGCSE Cryptography (2023 onwards)

iGCSE Cryptography (2023 onwards)

9th Grade - University

10 Qs

Cloud Infra and Security PU

Cloud Infra and Security PU

University

5 Qs

Malware Obfuscation

Malware Obfuscation

University

10 Qs

OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing

OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing

11th Grade - University

9 Qs

CyberCell360

CyberCell360

University

10 Qs

CNET151 Chapt 8 Encryption

CNET151 Chapt 8 Encryption

University

15 Qs

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

9th Grade - University

10 Qs

Cryptography UK 1

Cryptography UK 1

Assessment

Quiz

Computers

University

Medium

Created by

Udhayakumar Shanmugam

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

..............................................................Assures that private or confidential information is not made available or disclosed to unauthorized individuals.

Data Confidentiality

Data Integrity

System Integrity

Privacy

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The opposite of CIA Triad is

DAD Triad disclosure, alteration, and denial

DAD triad distraction, alteration, and denial

DAD triad disclosure, alteration, and destruction

DAD triad disclosure, Attack, and Denial

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Repudiation and masquerading is a threat to

Confidentiality

Integrity

Availability

Authenticity

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these attacks is related to Confidentiality?

Snooping

replaying

Denial of Service

Modification

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

............................................ is a concept that ensures that a person or entity cannot deny the authenticity of their digital actions.

Non-repudiation

Non Disclosure

Non Conformance

Non Availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

..................................... is the practice of concealing a file, message, image, or video within another file, message, image, or video

Steganography

Cryptography

Hiddenography

Geography

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

the process of Rearranging the elements in the plain text is known as ............................................

Substitution

Transposition

Product System

Transition

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?