Interception, Manipulation, Impersonation and Repudiation are typical threats to security in communications.

Internet Security Quiz

Quiz
•
Science
•
University
•
Hard
Alex Cioca
FREE Resource
159 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True
False
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
AES and DES are symmetric key encryption mechanisms.
True
False
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
DES and AES are examples of block-based ciphering mechanisms.
True
False
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The DES (Data Encryption Standard) for symmetric encryption is obsolete (it is not used) respect to the AES (Advanced Encryption Standard).
True
False
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is not possible to use the AES algorithm for digital signature.
True
False
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In cryptography, the “confusion” principle is the one that provokes that a small change in the key achieves a big change in the ciphered text.
True
False
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In cryptography, the “diffusion” principle is the one that achieves that with a small change in the clear text, a big change in the ciphered text will happen (plain text vs. cipher text independence).
True
False
Create a free account and access millions of resources
Similar Resources on Quizizz
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
25 questions
SS Combined Advisory Quiz

Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
15 questions
June Review Quiz

Quiz
•
Professional Development
20 questions
Congruent and Similar Triangles

Quiz
•
8th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade